Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 6 Jan 2011 07:10:26 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: possible flaw in widely used strtod.c
 implementation



----- Original Message -----
> On Wed, Jan 5, 2011 at 8:23 PM, Pierre Joye <pierre.php@...il.com>
> wrote:
> > On Wed, Jan 5, 2011 at 5:52 PM, Michael Gilbert
> > <michael.s.gilbert@...il.com> wrote:
> >
> >> The fact that this bug can lead to a denial-of-service in PHP is
> >> sufficient to warrant a CVE for PHP, but nothing else (I think). If
> >> it
> >> can lead to a dos in other apps, then each should get their own CVE
> >> (again in my opinion).
> >
> > I think so too but in any case it would rock if I could get a CVE #
> > asap, we are going to release 5.2.17/5.3.5 tomorrow (packaging now).
> 
> Anyone?

Please use CVE-2010-4645

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.