Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <50FE582B.4050007@redhat.com>
Date: Tue, 22 Jan 2013 10:13:15 +0100
From: Florian Weimer <fweimer@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request coreutils

On 01/21/2013 09:39 PM, Vincent Danen wrote:

> Red Hat/Fedora do include this patch, so it's more than just SUSE that
> ships them.  However, when I was looking at them last week, this struck
> me as just a non-exploitable crash and unless I'm missing something, I
> think it would be quite the stretch to call it a security flaw.

FWIW, it's fairly common to run sort on untrusted input.  Compared to 
other options, sort is widely available and surprisingly efficient.  But 
those use cases probably run with LC_ALL=C (for performance) and do not 
use the -d/-M options (for predictability), so they shouldn't be exposed.

-- 
Florian Weimer / Red Hat Product Security Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.