Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 28 Jul 2015 17:09:18 -0400 (EDT)
From: cve-assign@...re.org
To: kiall@...innes.ie
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request - OpenStack Designate mDNS DoS through incorrect handling of large RecordSets

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>> https://launchpad.net/bugs/1471161

>> Designate does not enforce the DNS protocol limit concerning record set sizes 

>> As a result, the rendering loop in desginate-mdns can does not make progress

>> https://bugs.launchpad.net/designate/+bug/1471161/comments/5

>> 1: Quotas were being bypassed as part of the v1 API.

> two CVE IDs:

> one for the original "does not enforce the DNS protocol limit
> concerning record set sizes" issue

Use CVE-2015-5694.


> one for the "Quotas were being bypassed" issue.

Use CVE-2015-5695.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVt+8TAAoJEKllVAevmvms1EsIAIpBDR/vWC+uADcipB08rtWP
EsYgrK0eISpGwuXiBMYtC7OcQjfDEk46qrbCNCamBi6CJWa7ubpzRpaUbkuZPt8v
R5IQPs8kraLhE17Q7Vx9WIhMObfvljcxJmJfZOXscv985bTvxui7KRkl1kdsznR0
48Wc2L55lvFBEwz0FdPnSHziiIwN0UO8UhqGjPJora+ZJvA5gbL7XFf7Z+J8MQJM
Mj8Q16OtNSNoYnZIuImXIqzvTAQTq8jbUs1iUdj3vyM0+ypw7413AYHKIdRfsTU9
T5ugRDaiPdnbXPzSrMtX2Lxb5ujW4VofgItZvFdl0yYUDufJP4hxw9Ex/YBWjx8=
=iCOz
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ