Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20131012012226.GS4394@ucc.gu.uwa.edu.au>
Date: Sat, 12 Oct 2013 09:22:26 +0800
From: Matt Johnston <matt@....asn.au>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: dropbear sshd daemon 2013.59 release

On Thu, Oct 10, 2013 at 11:41:27PM -0600, Kurt Seifried wrote:
> On 10/10/2013 07:27 AM, Marcus Meissner wrote:
> > It also has this changes entry which might need one: - Avoid
> > disclosing existence of valid users through inconsistent delays 
> > Thanks to Logan Lamb for reporting

> This one seems to not be as exploitable or did I misread the follow up
> emails?

This one needs a CVE too, just the link was wrong.                                                                                                            
https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a is
the correct patch.

Cheers,
Matt

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.