Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 27 Jan 2015 19:11:03 +0300
From: Solar Designer <>
Cc: Qualys Security Advisory <>
Subject: Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)

On Tue, Jan 27, 2015 at 05:04:58PM +0100, Hanno B??ck wrote:
> Origin seems to be a report from qualys.

They're about to send the full advisory in here.  This was coordinated
disclosure, but unfortunately there are discrepancies of a few hours.
The public disclosure time-of-day was coordinated too, but clearly was
not literally followed by everyone.


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ