Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 6 Jul 2010 15:51:57 +0200
From: Sebastian Krahmer <>
Subject: patch for remote buffer overflows and local message spoofing in mipv6 daemon


I tried this 2 years ago on vendor-sec and with the maintainers
at that time w/o success. I polished the patch to fit in the current commit.
The bugs were not fixed during the two years.
Can someone assign CVE(s)?


~ perl
~ $_='print"\$_=\47$_\47;eval"';eval
~ - SuSE Security Team
~ SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)

View attachment "mipv6-daemon-0.5rc1.diff" of type "text/x-patch" (2918 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ