Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 22 Jan 2013 10:07:49 +0100
From: Matthias Weckbecker <mweckbecker@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request coreutils

On Monday 21 January 2013 15:59:48 Michael Tokarev wrote:
> 21.01.2013 18:54, Sebastian Krahmer wrote:
> > Hi,
> >
> > Can someone assign a CVE id for a buffer overflow in coreutils?
> > Its the same code snippet (coreutils-i18n.patch) and it affects sort,
> > uniq and join:
>
> It's probably worth to mention that these are SuSE-specific and not in
> upstream, if I understand correctly.
>

Tough to say unless you really looked into every single distribution out
there. Just assuming something is dangerous.

> > https://bugzilla.novell.com/show_bug.cgi?id=798538
> > https://bugzilla.novell.com/show_bug.cgi?id=796243
> > https://bugzilla.novell.com/show_bug.cgi?id=798541
>
> Thanks,
>
> /mjt

Thanks,
Matthias

-- 
Matthias Weckbecker, Senior Security Engineer, SUSE Security Team
SUSE LINUX Products GmbH, Maxfeldstr. 5, D-90409 Nuernberg, Germany
Tel: +49-911-74053-0;  http://suse.com/
SUSE LINUX Products GmbH, GF: Jeff Hawn, HRB 16746 (AG Nuernberg) 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.