oss-sec mailing list archives
Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)
From: Hanno Böck <hanno () hboeck de>
Date: Thu, 29 Jan 2015 13:09:13 +0100
On Thu, 29 Jan 2015 02:05:38 -0700 Kurt Seifried <kseifried () redhat com> wrote:
So you'll be doing the work to confirm which ones are/are not, patch them, regression test the patches and so on? Awesome! There's a reason we don't treat every potential security flaw as a security vulnerability. We have finite resources and pretty much an infinite number of flaws to deal with. Until you solve that problem we have to make due with "best effort", letting perfection be the enemy of good will kill us.
I find that sarcastic comment inappropriate. After all it's your company that's selling a product that makes the promise to backport important security fixes for years. I think we have a real problem here and I'd like to have a talk how to solve it. Debian, Redhat, Ubuntu and many others are making an implicit promise with their long time supported stable distributions that they'll take care of important bugs. I have big doubts how capable they are in delivering that promise. There are just too many bugs to take care of. I'll write up something longer on that topic later today. And yes: I'd like people to cry alarm every time they see a buffer overflow in glibc or any other core lib. Even if we aren't capable of deeply checking every one of them: Having the information available somewhere else than depply hidden in a google bugtracker would be an improvement. If it is too much for this list create another place for it. -- Hanno Böck http://hboeck.de/ mail/jabber: hanno () hboeck de GPG: BBB51E42
Attachment:
_bin
Description: OpenPGP digital signature
Current thread:
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235), (continued)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Huzaifa Sidhpurwala (Jan 28)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Kurt Seifried (Jan 28)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) cve-assign (Jan 29)
- Please REJECT CVE-2012-6686 Florian Weimer (Feb 24)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Raphael Geissert (Jan 28)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Paul Pluzhnikov (Jan 28)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Yves-Alexis Perez (Jan 28)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Sven Kieske (Jan 29)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Kurt Seifried (Jan 29)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Hanno Böck (Jan 29)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Paul Pluzhnikov (Jan 29)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Hanno Böck (Jan 29)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Solar Designer (Jan 29)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Kees Cook (Jan 29)
- Re: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) Alexander Cherepanov (Jan 29)