
oss-sec mailing list archives
Re: CVE request: Invalid pointer dereference in the GNOME librest library
From: cve-assign () mitre org
Date: Mon, 23 Mar 2015 03:36:18 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
The OAuth implementation in librest, a helper library for RESTful services part of the GNOME project, incorrectly truncates the pointer returned by the rest_proxy_call_get_url function call, leading to an application crash, or worse. https://bugzilla.gnome.org/show_bug.cgi?id=742644 https://git.gnome.org/browse/librest/commit/?id=b50ace7738ea03817acdad87fb2b338a86018329 https://bugzilla.redhat.com/show_bug.cgi?id=1183982 The security impact was noted in 2015, although the bug was fixed in 2014.
will lead to memory errors when the size of an int is not the same as a pointer
Use CVE-2015-2675. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVD8IYAAoJEKllVAevmvmsiIYH/0Ty9WFGi6JY2v9v46ZTJmJI rXIEkrt5c2vY2HxPQse1l2pFAn5mo5UJQf1JwaXiZ8rg47KYETOMQi9aAUr3tJaP KHcFNrIYos6ywBFQwI+J+Yzrx2oBTp/CFggyRmyvb/IHRRsVr0zryjaeH7OHxKwE wvdibr+JMDCv1OB6odzGtRQ41QF9SlxgqcoVOby2DBR9D+tu3oTfw1ZIW5PKNLYl UaOCWcKYBnDO0A4D8Qnnur9GOXVASzfQByBwURDfAGhzgRVYi0mU6LINZ+zpopdX O8/lYkRTOHR/LFXPlOGNCahRXT9PeMt06drUCmsFRFWz8B1Ug/gdVuSpYGnbIko= =0SUt -----END PGP SIGNATURE-----
Current thread:
- CVE request: Invalid pointer dereference in the GNOME librest library Florian Weimer (Mar 04)
- Re: CVE request: Invalid pointer dereference in the GNOME librest library cve-assign (Mar 23)