Bug#745301: libmms: CVE-2014-2892: heap-based buffer overflow

Sebastian Ramacher sramacher at debian.org
Fri Apr 25 14:40:28 UTC 2014


Hi Security Team,

On 2014-04-20 11:59:23, Salvatore Bonaccorso wrote:
> Source: libmms
> Version: 0.6-1
> Severity: grave
> Tags: security upstream fixed-upstream
> 
> Hi,
> 
> the following vulnerability was published for libmms.
> 
> CVE-2014-2892[0]:
> heap-based buffer overflow

Please find attached the debdiffs for squeeze and wheezy. Please let me know if
it's okay to upload them to the squeeze-security and wheezy-security.

Cheers
-- 
Sebastian Ramacher
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-multimedia-maintainers/attachments/20140425/ffb60d0d/attachment.sig>


More information about the pkg-multimedia-maintainers mailing list