Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 17 Feb 2014 14:03:49 +0530 (IST)
From: P J P <ppandit@...hat.com>
To: oss security list <oss-security@...ts.openwall.com>
Subject: Re: CVE Request New-djbdns: dnscache: potential cache
 poisoning

  Hello,

+-- On Wed, 12 Feb 2014, P J P wrote --+
| +-- On Wed, 12 Feb 2014, Michael Samuel wrote --+
| | >  -> http://www.openwall.com/lists/oss-security/2014/02/11/7
| | The same issue, different result.
| 
|   Yes, true. Thank you for confirming.

  So, does this qualify for a CVE?

Thank you.
--
Prasad J Pandit / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ