Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <52672D6B.6010708@redhat.com>
Date: Tue, 22 Oct 2013 19:59:07 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: another glibc flaw, similar to CVE-2013-1914,
 but in AF_INET6

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/22/2013 04:42 PM, Vincent Danen wrote:
> It was found that the CVE-2013-1914 fix in glibc for AF_UNSPEC
> missed a an identical case but with AF_INET6.  Could a CVE be
> assigned to this? This issue has the same impact as CVE-2013-1914.
> 
> References:
> 
> https://sourceware.org/ml/libc-alpha/2013-10/msg00733.html 
> https://bugzilla.redhat.com/show_bug.cgi?id=1022280
> 
> Thanks.
> 

Please use CVE-2013-4458 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)

iQIcBAEBAgAGBQJSZy1qAAoJEBYNRVNeJnmTF/4P/2+5FLBkwlUwC55vTvbb2lq0
gnRYK3Ukme8ViRy0XZw/vm6p5g/7Wm8aj3DaTzA4cMuMMQ7fUL9E3ZUqP/xmltb6
CfvzcDhqZCNp8OyKSn5ELK8GFJxOToiwTijlN4gHJ+FostNq+PRtkBRh6x3HN9h5
sNBtXFKIqISRaZOVZD1mNCuPC2dvypP4SbCVuBNa7s24drwO2/rKMIVQxrJVbzMt
XTRvMEWNqz83gUA4orBcDWB6dQvIfjQPxrtIebvLnZ0pL3iiRXhQsfRexmNjtQtc
gCpmfKoa9bl1x9elExhAduSkFjoiaMlj5HT8vSWXT21ADd6r+0elu9LJLYKNNf6s
HZ6WsuK3fSLLPWQ1oK0mve1PLbOEDykWxTUwtNdmeRTE3d1qWg7nE26O0MA8+W3t
aTu/68gHCe+d7USlcUcvgF6cGKaqC4o3yS4iDcOMHVaStDUePXL6Kz+HGJ/pOzPc
oBcUCCJ5ud88bGg2q1URXnEoyxHdVmgYRwDiNnWl6wX6cK86oaBHTAHmzoMTr0ro
dm/+o5Lgz7R/3fXQHXswIez+DwhjKb+kd3sbkqAtDsn1NhVDy0rBSI1exMxMQaQe
1jfqae57/aKLzMJsDIX7+CLNz5tmcAoG+sZZr5daIMIfUYzIY26dV74QPTLjDql7
bW3SvoKIC5uiVqqDTKNk
=BHAT
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.