Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140109165152.GA14212@hal.lan>
Date: Thu, 9 Jan 2014 17:51:52 +0100
From: Guido Berhoerster <guido+openwall.com@...hoerster.name>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: tmux local denial of service (2009)

* Florian Weimer <fweimer@...hat.com> [2014-01-09 17:39]:
> Alexander Wirt discovered that local users can block other users
> from using tmux by creating suitably named directories in /tmp:
> 
> <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529082>
> 
> This is a minor local denial of service issue.  This was reported
> publicly in 2009, so it receive an ID for that year.
> 
> Corresponding Red Hat bug:
> 
> <https://bugzilla.redhat.com/show_bug.cgi?id=1036136>

How is that a DOS? $TMPDIR/tmux-<uid> is merely a default, tmux
allows users to override the socket path using the -S command line
option.
-- 
Guido Berhoerster

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.