Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 12 Feb 2014 12:04:21 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
Subject: Re: CVE Request New-djbdns: dnscache: potential cache
 poisoning

+-- On Wed, 12 Feb 2014, Michael Samuel wrote --+
| >  -> http://www.openwall.com/lists/oss-security/2014/02/11/7
| The same issue, different result.

  Yes, true. Thank you for confirming.
 
| The described issue would result in expiring attacker-specified (but
| not more) cache entries at approximately the same CPU cost.  So
| this is something else.

  Agreed.

Thank you.
--
Prasad J Pandit / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ