oss-sec mailing list archives
Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon
From: Sebastian Krahmer <krahmer () suse de>
Date: Wed, 7 Jul 2010 14:13:19 +0200
Its probably better to have two IDs, even though its unlikely that they will be fixed separately. Its two issues at last. Sebastian On Wed, Jul 07, 2010 at 07:42:50AM -0400, Josh Bressers wrote:
----- "Sebastian Krahmer" <krahmer () suse de> wrote:Hi, I tried this 2 years ago on vendor-sec and with the maintainers at that time w/o success. I polished the patch to fit in the current commit. The bugs were not fixed during the two years. Can someone assign CVE(s)?Do you need two IDs? This message sounds like it, but I'm not completely sure. Thanks. -- JB
-- ~ ~ perl self.pl ~ $_='print"\$_=\47$_\47;eval"';eval ~ krahmer () suse de - SuSE Security Team ~ SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
Current thread:
- patch for remote buffer overflows and local message spoofing in mipv6 daemon Sebastian Krahmer (Jul 06)
- Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon Josh Bressers (Jul 07)
- Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon Sebastian Krahmer (Jul 07)
- Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon Arnaud Ebalard (Jul 08)
- Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon Sebastian Krahmer (Jul 07)
- <Possible follow-ups>
- Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon Josh Bressers (Jul 08)
- Re: patch for remote buffer overflows and local message spoofing in mipv6 daemon Josh Bressers (Jul 07)