Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 6 Jun 2014 21:53:52 -0400
From: Rich Felker <>
Subject: Security advisory for musl libc - remote stack-based buffer overflow
 in DNS response parsing [CVE-2014-3484]

Content of type "message/rfc822" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ