Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 07 May 2012 15:08:17 +0200
From: Jan Lieskovsky <>
To: Sebastian Krahmer <>
Subject: Re: connman heads up / CVE requests

Hi Sebastian,

On 05/07/2012 10:27 AM, Sebastian Krahmer wrote:
> Hi,
> I reported several issues

Just to confirm, you have meant four issues:
1) Conman doesn't check for the origin of netlink messages

    with patches:

2) Check hostname validity prior setting the hostname in loopback

    with patches:

3) DHCPv6 option parsing vulnerable to DoS (endless loop):

    with patches:
    There doesn't seem to be upstream patches for this yet.

4) Check vpnc options for validity prior saving them:

    with patches:

> to the connman developers last week and it
> seems they made patches for most of them which were
> posted on their mailing list. The one that I am missing is related
> to the GKeyFile/VPN settings storage.

So yet another patch is needed to correct this except [4a]? Or is
[4a] unrelated to this?

> I did not review the
> patches itself, except checking them slightly.
> The bug report is here:
> It was not a full review, so some parts remain unchecked.
> Some dists seem to ship it and before it goes the wicd way,
> I'd rather ask for CVE's myself.

For now could you confirm count of the issues and links to
patches, where appropriate? (this will be needed anyway for
purpose of CVE request)

Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

> Sebastian

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.