Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <52CEF328.4070404@redhat.com>
Date: Thu, 09 Jan 2014 20:06:16 +0100
From: Florian Weimer <fweimer@...hat.com>
To: cve-assign@...re.org, guido+openwall.com@...hoerster.name
CC: oss-security@...ts.openwall.com
Subject: Re: CVE request: tmux local denial of service (2009)

On 01/09/2014 07:44 PM, cve-assign@...re.org wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>> allows users to override the socket path using the -S command line option.
>
> We'd like to consider this ineligible for a CVE unless there's new
> information. In many cases, "ability to cause an inconvenience" is not
> sufficient for a CVE assignment. The nature of the application
> apparently makes it unlikely that this would, for example, disrupt
> unattended root-executed scripts that have a hardcoded tmux command
> line.

I reported this here because tmux is sometimes used to start servers on 
system boot:

http://unix.stackexchange.com/questions/71372/using-tmux-on-boot-up-of-linux-centos
http://askubuntu.com/questions/62434/why-does-upstart-keep-respawning-my-process
https://bowerstudios.com/node/953
http://code.google.com/p/webrtc2sip/issues/detail?id=80

-- 
Florian Weimer / Red Hat Product Security Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.