|
Message-ID: <AANLkTi=CYJEv4pdUghLN39h6bpYhknrWLaAq=VSizWXE@mail.gmail.com> Date: Thu, 6 Jan 2011 11:01:12 +0100 From: Pierre Joye <pierre.php@...il.com> To: oss-security@...ts.openwall.com Subject: Re: possible flaw in widely used strtod.c implementation On Wed, Jan 5, 2011 at 8:23 PM, Pierre Joye <pierre.php@...il.com> wrote: > On Wed, Jan 5, 2011 at 5:52 PM, Michael Gilbert > <michael.s.gilbert@...il.com> wrote: > >> The fact that this bug can lead to a denial-of-service in PHP is >> sufficient to warrant a CVE for PHP, but nothing else (I think). If it >> can lead to a dos in other apps, then each should get their own CVE >> (again in my opinion). > > I think so too but in any case it would rock if I could get a CVE # > asap, we are going to release 5.2.17/5.3.5 tomorrow (packaging now). Anyone? -- Pierre @pierrejoye | http://blog.thepimp.net | http://www.libgd.org
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.