Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 21 Jan 2013 13:39:27 -0700
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request coreutils

* [2013-01-21 19:17:49 +0100] Moritz Muehlenhoff wrote:

>> Can someone assign a CVE id for a buffer overflow in coreutils?
>> Its the same code snippet (coreutils-i18n.patch) and it affects sort, uniq and join:
>>
>> https://bugzilla.novell.com/show_bug.cgi?id=798538
>> https://bugzilla.novell.com/show_bug.cgi?id=796243
>> https://bugzilla.novell.com/show_bug.cgi?id=798541
>
>Could you send the faulty patch to the list so that distros can validate
>that they don't include it themselves?

Red Hat/Fedora do include this patch, so it's more than just SUSE that
ships them.  However, when I was looking at them last week, this struck
me as just a non-exploitable crash and unless I'm missing something, I
think it would be quite the stretch to call it a security flaw.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.