Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4FDB93A7.2050308@redhat.com>
Date: Fri, 15 Jun 2012 13:57:27 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: Stefan Cornelius <scorneli@...hat.com>
CC: oss-security@...ts.openwall.com, Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>,
        Behdad Esfahbod <behdad@...dad.org>
Subject: Re: CVE Request -- mosh (and probably vte too): mosh
 server DoS (long loop) due improper parsing of terminal parameters in terminal
 dispatcher

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/15/2012 11:59 AM, Stefan Cornelius wrote:
> On 05/22/2012 07:39 PM, Kurt Seifried wrote:
>>> B) vte issue: ============= 
>>> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673871#5
> 
>>> there is similar issue in vte too (Gnome bug private for now):
>>>  https://bugzilla.gnome.org/show_bug.cgi?id=676090
> 
>>> Cc-ed Behdad Esfahbod on this post to clarify, what are the 
>>> upstream plans regarding this report in vte and if the CVE id
>>> has been already assigned for it.
> 
>> Will wait for confirmation.
> 
> 
> Hi,
> 
> I think http://www.openwall.com/lists/oss-security/2012/05/23/6 is
> a reasonable confirmation. Additionally, upstream fixed this in
> 0.32.2: 
> http://ftp.gnome.org/pub/GNOME/sources/vte/0.32/vte-0.32.2.news
> 
> In case you agree that all requirements are fulfilled, could you
> please assign a CVE to the B) part?
> 
> Thanks in advance and kind regards,

Please use CVE-2012-2738 for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=b9Af
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.