Bug#745301: libmms: CVE-2014-2892: heap-based buffer overflow
Sebastian Ramacher
sramacher at debian.org
Fri Apr 25 14:40:28 UTC 2014
Hi Security Team,
On 2014-04-20 11:59:23, Salvatore Bonaccorso wrote:
> Source: libmms
> Version: 0.6-1
> Severity: grave
> Tags: security upstream fixed-upstream
>
> Hi,
>
> the following vulnerability was published for libmms.
>
> CVE-2014-2892[0]:
> heap-based buffer overflow
Please find attached the debdiffs for squeeze and wheezy. Please let me know if
it's okay to upload them to the squeeze-security and wheezy-security.
Cheers
--
Sebastian Ramacher
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-multimedia-maintainers/attachments/20140425/ffb60d0d/attachment.sig>
More information about the pkg-multimedia-maintainers
mailing list