Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080525145409.GA308@ngolde.de>
Date: Sun, 25 May 2008 16:54:09 +0200
From: Nico Golde <oss-security+ml@...lde.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE id request: xscreensaver

Hi Tomas,
* Tomas Hoger <thoger@...hat.com> [2008-05-25 15:52]:
> On Sun, 25 May 2008 18:29:13 +1000 Steffen Joeris
> <steffen.joeris@...lelinux.de> wrote:
> > Pierre Habouzit discovered that resizing with the xrandr tool can
> > crash xscreensaver.
> > 
> > Debian Bug report:
> > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482385
> > 
> > The tested version of xscreensaver is 5.05-1, but at the moment there
> > is no reason to assume that the bug did not exist in previous
> > versions.
> 
> Is there any known attack vector crossing trust boundary?  Usage of
> xrandr should be fully under the control of the user running
> xscreensaver.

I don't see any, looks more like an normal application bug to me.

Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de - nion@...ber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.