Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTi=CYJEv4pdUghLN39h6bpYhknrWLaAq=VSizWXE@mail.gmail.com>
Date: Thu, 6 Jan 2011 11:01:12 +0100
From: Pierre Joye <pierre.php@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: possible flaw in widely used strtod.c implementation

On Wed, Jan 5, 2011 at 8:23 PM, Pierre Joye <pierre.php@...il.com> wrote:
> On Wed, Jan 5, 2011 at 5:52 PM, Michael Gilbert
> <michael.s.gilbert@...il.com> wrote:
>
>> The fact that this bug can lead to a denial-of-service in PHP is
>> sufficient to warrant a CVE for PHP, but nothing else (I think).  If it
>> can lead to a dos in other apps, then each should get their own CVE
>> (again in my opinion).
>
> I think so too but in any case it would rock if I could get a CVE #
> asap, we are going to release 5.2.17/5.3.5 tomorrow (packaging now).

Anyone?

-- 
Pierre

@pierrejoye | http://blog.thepimp.net | http://www.libgd.org

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.