![]() |
|
Message-ID: <CAF6rxg=cdFBEpXvRQ5MjJBEdKoxMG0YhMz_o89u5k=ar8H77Qg@mail.gmail.com> Date: Mon, 24 Oct 2011 15:12:53 -0400 From: Eitan Adler <eadler@...ebsd.org> To: oss-security@...ts.openwall.com Cc: secteam@...ebsd.org, security@...ian.org Subject: Re: CVE Request: FreeBSD kernel On Thu, Oct 20, 2011 at 12:26 PM, Moritz Muehlenhoff <jmm@...ian.org> wrote: >> > http://security.freebsd.org/advisories/FreeBSD-SA-11:05.unix.asc > This has been assigned CVE-2011-4062 by MITRE in the mean time. Something is odd with the MITRE CVE: According to http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4062 the bug is in the Linux emulation code. However the bug is really in the bind(2) system call. There was a different bug in the emulation code exposed by fixing the bind vulnerability but the system is vulnerable even without linux emulation turned on. Additionally Debian appears to have copied the incorrect data from the MITRE cve (http://www.debian.org/security/2011/dsa-2325)/ -- Eitan Adler Ports committer X11, Bugbusting teams
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.