lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri Sep  9 08:21:33 2005
From: heikki at osafoundation.org (Heikki Toivonen)
Subject: Mozilla Firefox "Host:" Buffer Overflow

Tom Ferris wrote:
> Vendor Status:
> Mozilla was notified, and im guessing they are working on a patch. Who
> knows though?

That seems like a gross mischaracterization, at least by looking at the
Bugzilla bug filed by you which I believe this corresponds to. The bug
was reported two days ago (Sep 6), the first comment came less than an
hour after that, and the first attempted fix was attached less than two
hours after the bug was filed. Further comments explained how it was
proving hard to find what and where was actually going wrong to put in
the right fix. 10 replies total in less than two days. To me it seems
obvious work is being done.

-- 
  Heikki Toivonen

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 253 bytes
Desc: OpenPGP digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050909/04468aa3/signature.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ