|
Message-ID: <20150127161103.GA18713@openwall.com> Date: Tue, 27 Jan 2015 19:11:03 +0300 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Cc: Qualys Security Advisory <qsa@...lys.com> Subject: Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) On Tue, Jan 27, 2015 at 05:04:58PM +0100, Hanno B??ck wrote: > Origin seems to be a report from qualys. They're about to send the full advisory in here. This was coordinated disclosure, but unfortunately there are discrepancies of a few hours. The public disclosure time-of-day was coordinated too, but clearly was not literally followed by everyone. Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.