Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 24 Oct 2011 15:12:53 -0400
From: Eitan Adler <eadler@...ebsd.org>
To: oss-security@...ts.openwall.com
Cc: secteam@...ebsd.org, security@...ian.org
Subject: Re: CVE Request: FreeBSD kernel

On Thu, Oct 20, 2011 at 12:26 PM, Moritz Muehlenhoff <jmm@...ian.org> wrote:
>> >    http://security.freebsd.org/advisories/FreeBSD-SA-11:05.unix.asc
> This has been assigned CVE-2011-4062 by MITRE in the mean time.

Something is odd with the MITRE CVE:

According to http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4062
the bug is in the Linux emulation code. However the bug is really in
the bind(2) system call. There was a different bug in the emulation
code exposed by fixing the bind vulnerability but the system is
vulnerable even without linux emulation turned on.

Additionally Debian appears to have copied the incorrect data from the
MITRE cve (http://www.debian.org/security/2011/dsa-2325)/



-- 
Eitan Adler
Ports committer
X11, Bugbusting teams

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.