lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <5de3c09b0807131250x3ce9a009x41983c7b2304de0c@mail.gmail.com>
Date: Sun, 13 Jul 2008 14:50:26 -0500
From: "eugaaa@...il.com" <eugaaa@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: DNS Cache Dan Kamikaze (Actual Exploit Discussion)
http://blogs.zdnet.com/security/?p=1466
Can someone clarify what they meant by "non-reversible patch" ?
http://www.debian.org/security/2008/dsa-1603
Are these .deb patches automagical?
*scratches head*
I'm not interested in discussing the hype or scene-war aspect of this
vulnerability.
Has anyone actually verified the impact of this vulnerability? Any code,
anything?
(http://www.milw0rm.com/exploits/4266)
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/