Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 10 Sep 2010 20:37:10 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley@...re.org
Subject: Re: CVE request: mednafen stack manipulation

I can't make any sense of this either. Let's just use CVE-2010-3085 to note
that version 0.8.D fixes some security flaws.

Thanks.

-- 
    JB


----- "Hanno Böck" <hanno@...eck.de> wrote:

> http://sourceforge.net/news/?group_id=150840&id=287363
> 
> 
> "Fixed a couple of remotely-exploitable(if connected to a malicious
> server) 
> stack manipulation bugs in the network play code."
> 
> Not more info. Please assign CVE.
> 
> -- 
> Hanno Böck		Blog:		http://www.hboeck.de/
> GPG: 3DBD3B20		Jabber/Mail:	hanno@...eck.de
> 
> http://schokokeks.org - professional webhosting

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ