Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 15 May 2009 18:44:31 +0200
From: Jan Lieskovsky <>
To: Steven Christey <>
Subject: CVE Request -- Eggdrop

Hello Steve,

  Thomas Sader yesterday reported, the original patch for original
stack-based buffer overflow flaw (CVE-2007-2807) in Eggdrop is
incomplete (might introduce another flaw). 

(affected versions, vulnerability details, PoC, resolution). (upstream page)
(patch towards the latest version).

Could you allocate a new CVE id for it?

Thanks, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ