|
Message-Id: <200808231753.27948.rbu@gentoo.org>
Date: Sat, 23 Aug 2008 17:53:16 +0200
From: Robert Buchholz <rbu@...too.org>
To: vendor-sec@....de,
veillard@...hat.com
Cc: gnome@...too.org,
oss-security@...ts.openwall.com
Subject: Re: libxml2 denial of service flaw (CVE-2008-3281)
On Wednesday 20 August 2008, Daniel Veillard wrote:
> On Wed, Aug 20, 2008 at 12:42:29PM -0400, Josh Bressers wrote:
> > Yes, this can be considered public. An announcement should be
> > appearing on the xml list shortly:
> >
> > http://mail.gnome.org/archives/xml/
>
> It's out:
>
> http://mail.gnome.org/archives/xml/2008-August/msg00034.html
>
> thanks everybody !
Our gnome maintainers pointed out that the patch (which was also pushed
upstream) breaks GDM in GNOME 2.22, as can be seen in Gentoo and
Mandriva:
https://bugs.gentoo.org/show_bug.cgi?id=235529
https://qa.mandriva.com/show_bug.cgi?id=43094
upstream bug:
http://bugzilla.gnome.org/show_bug.cgi?id=549087
Those who did not push updates yet might want to delay this, we have
been reverting the patch for now.
I am CC'ing oss-security, please send follow-ups to that list.
Robert
Download attachment "signature.asc " of type "application/pgp-signature" (836 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.