|
Message-ID: <20130121203927.GB2637@redhat.com> Date: Mon, 21 Jan 2013 13:39:27 -0700 From: Vincent Danen <vdanen@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: CVE Request coreutils * [2013-01-21 19:17:49 +0100] Moritz Muehlenhoff wrote: >> Can someone assign a CVE id for a buffer overflow in coreutils? >> Its the same code snippet (coreutils-i18n.patch) and it affects sort, uniq and join: >> >> https://bugzilla.novell.com/show_bug.cgi?id=798538 >> https://bugzilla.novell.com/show_bug.cgi?id=796243 >> https://bugzilla.novell.com/show_bug.cgi?id=798541 > >Could you send the faulty patch to the list so that distros can validate >that they don't include it themselves? Red Hat/Fedora do include this patch, so it's more than just SUSE that ships them. However, when I was looking at them last week, this struck me as just a non-exploitable crash and unless I'm missing something, I think it would be quite the stretch to call it a security flaw. -- Vincent Danen / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.