Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2033753502.2168681278502970126.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Wed, 7 Jul 2010 07:42:50 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: yoshfuji@...ux-ipv6.org, Sebastian Krahmer <krahmer@...e.de>
Subject: Re: patch for remote buffer overflows and local
 message spoofing in mipv6 daemon


----- "Sebastian Krahmer" <krahmer@...e.de> wrote:

> Hi,
> 
> I tried this 2 years ago on vendor-sec and with the maintainers at that
> time w/o success. I polished the patch to fit in the current commit.  The
> bugs were not fixed during the two years.  Can someone assign CVE(s)?
> 

Do you need two IDs? This message sounds like it, but I'm not completely
sure.

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.