Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20150207124451.04A7E6C015D@smtpvmsrv1.mitre.org>
Date: Sat,  7 Feb 2015 07:44:51 -0500 (EST)
From: cve-assign@...re.org
To: opensource@...l.name
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request for denial-of-service vulnerability in fcgi

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> there appears to be at least a denial-of-service vulnerability in fcgi:
> https://bugzilla.redhat.com/show_bug.cgi?id=1189958

> According to the bug report, if more than 1024 connections are received, a segfault can occur.
> 
> https://bugs.launchpad.net/ubuntu/+source/libfcgi/+bug/933417
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681591

Use CVE-2012-6687.

The scope of this CVE does not include the
https://bugs.launchpad.net/ubuntu/+source/libfcgi/+bug/933417/comments/5
issue in OS_DoIo. If there is an OS_DoIo vulnerability, a separate
CVE ID would be needed.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJU1gf/AAoJEKllVAevmvmseD0H/jmMNvGcAE101HMyXsbJUT2r
wVIfAiLa7Igiu6p0dLASp5rXe924aJg8eVrBL+mfWvNX0f9YlFx+g7qB82NE9h2n
vtqVRlLYxucL7LYgwoQTt9slkWbhtCnYp9etItJzm+nWejOURTkvr7CZ/HgGeJDy
Yc0eLzEamsXSeSnnLZyn3CGG0bL9nFLE30oTnNHbrffDMzsV9CtS62omgD59PfLV
gN7wcx3V6FJdILdMLlV/HJTa+cqnQzLU0H+0s3ZVI2f0ikonnKJj3lwxGnnOcOqC
c2JRRiBI79CeGsqdsfMNejg/4cv3AbvvwaxZ7/fmHo9YjgRRG3U97dT/vi3U9G0=
=2ZDL
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.