Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 20 Aug 2008 21:08:59 +0100
From: Joe Orton <jorton@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request for neon

On Wed, Aug 20, 2008 at 12:06:35PM -0400, Steven M. Christey wrote:
> On Fri, 15 Aug 2008, Joe Orton wrote:
> > A NULL pointer deference in the Digest authentication support in neon
> > versions 0.28.0 through 0.28.2 inclusive allows a malicious server to
> > crash a client application, resulting in possible denial of service.
> >
> > Reference: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476571
> 
> Use CVE-2008-3746, to be filled in later.

Thanks.  I've now released neon 0.28.3 to fix this issue:

http://lists.manyfish.co.uk/pipermail/neon/2008-August/000038.html
http://lists.manyfish.co.uk/pipermail/neon/2008-August/000040.html

Regards, Joe

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.