Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100316210827.2aea6df2@redhat.com>
Date: Tue, 16 Mar 2010 21:08:27 +0100
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request -- Unbound v1.4.3 -- 64 bit
 platforms specific remote DoS

On Tue, 16 Mar 2010 11:56:31 -0600 Vincent Danen <vdanen@...hat.com>
wrote:

> >  Unbound upstream has released latest, v1.4.3 version:
> >  [1] http://www.unbound.net/download.html
> >
> >  addressing one denial of service issue, specific to 64 bit
> >  platforms.
> >
> >References:
> >  [2] http://bugs.gentoo.org/show_bug.cgi?id=309117
> >
> >Could you allocate CVE id for it?
> 
> Please use CVE-2010-0735 for this issue.

This just got CVE-2010-0969 from Mitre:

Unbound before 1.4.3 does not properly align structures on 64-bit
platforms, which allows remote attackers to cause a denial of service
(daemon crash) via unspecified vectors.

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.