|
Message-ID: <52CEF328.4070404@redhat.com> Date: Thu, 09 Jan 2014 20:06:16 +0100 From: Florian Weimer <fweimer@...hat.com> To: cve-assign@...re.org, guido+openwall.com@...hoerster.name CC: oss-security@...ts.openwall.com Subject: Re: CVE request: tmux local denial of service (2009) On 01/09/2014 07:44 PM, cve-assign@...re.org wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > >> allows users to override the socket path using the -S command line option. > > We'd like to consider this ineligible for a CVE unless there's new > information. In many cases, "ability to cause an inconvenience" is not > sufficient for a CVE assignment. The nature of the application > apparently makes it unlikely that this would, for example, disrupt > unattended root-executed scripts that have a hardcoded tmux command > line. I reported this here because tmux is sometimes used to start servers on system boot: http://unix.stackexchange.com/questions/71372/using-tmux-on-boot-up-of-linux-centos http://askubuntu.com/questions/62434/why-does-upstart-keep-respawning-my-process https://bowerstudios.com/node/953 http://code.google.com/p/webrtc2sip/issues/detail?id=80 -- Florian Weimer / Red Hat Product Security Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.