Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 28 Feb 2011 16:54:01 -0500
From: Michael Gilbert <michael.s.gilbert@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: cve request: eglibc memory corruption

On Mon, 28 Feb 2011 15:55:34 -0500 (EST) Josh Bressers wrote:

> ----- Original Message -----
> > Hi,
> > 
> > An issue was disclosed for eglibc [0],[1]. Please assign a CVE id for
> > it.
> > 
> > Thanks,
> > Mike
> > 
> > [0] http://seclists.org/fulldisclosure/2011/Feb/635
> > [1] http://bugs.debian.org/615120
> 
> It should be noted this also affects glibc.
> Does anyone know when this was fixed in glibc by chance? The bug has no details.

According to a follow-up message to the thread above [0], this was fixed
via [1], which is the patch Debian used to fix the issue.

Best wishes,
Mike

[0]http://seclists.org/fulldisclosure/2011/Feb/644
[1]http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=f15ce4d8dc139523fe0c273580b604b2453acba6

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.