|
Message-ID: <Pine.GSO.4.51.0807181148300.17955@faron.mitre.org> Date: Fri, 18 Jul 2008 11:48:34 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com Subject: Re: CVE id request: op ====================================================== Name: CVE-2008-3229 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3229 Reference: MLIST:[oss-security] 20080712 CVE id request: op Reference: URL:http://www.openwall.com/lists/oss-security/2008/07/12/4 Reference: CONFIRM:http://swapoff.org/changeset/563 Stack-based buffer overflow in op before Changeset 563, when xauth support is enabled, allows local users to gain privileges via a long XAUTHORITY environment variable.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.