Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 7 Jul 2010 14:13:19 +0200
From: Sebastian Krahmer <krahmer@...e.de>
To: Josh Bressers <bressers@...hat.com>
Cc: oss-security@...ts.openwall.com, yoshfuji@...ux-ipv6.org
Subject: Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon

Its probably better to have two IDs, even though its unlikely
that they will be fixed separately. Its two issues at last.

Sebastian


On Wed, Jul 07, 2010 at 07:42:50AM -0400, Josh Bressers wrote:
> 
> ----- "Sebastian Krahmer" <krahmer@...e.de> wrote:
> 
> > Hi,
> > 
> > I tried this 2 years ago on vendor-sec and with the maintainers at that
> > time w/o success. I polished the patch to fit in the current commit.  The
> > bugs were not fixed during the two years.  Can someone assign CVE(s)?
> > 
> 
> Do you need two IDs? This message sounds like it, but I'm not completely
> sure.
> 
> Thanks.
> 
> -- 
>     JB

-- 
~
~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer@...e.de - SuSE Security Team
~ SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ