Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 25 Mar 2009 13:46:11 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
Cc: oss-security <oss-security@...ts.openwall.com>
Subject: CVE request -- zsh, XFree86-xfs/xorg-x11-xfs, screen

Hello Steve,

  could you please allocate new CVE ids for the following issues?

1, zsh Stack-based buffer overflow due improper escaping of the '!' character
   References: 
   https://bugs.launchpad.net/ubuntu/+source/zsh/+bug/333722
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521108
   https://bugzilla.redhat.com/show_bug.cgi?id=492089

2, XFree86-xfs / xorg-x11-xfs Unsafe usage of temporary file
   References:
   https://bugs.launchpad.net/ubuntu/+source/xfs/+bug/299560  
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521107
   https://bugzilla.novell.com/show_bug.cgi?id=408006
   https://bugzilla.redhat.com/show_bug.cgi?id=492098

3, screen: Unsafe usage of temporary file
   References:
   https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123  
   https://bugzilla.redhat.com/show_bug.cgi?id=492104

Thanks, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ