Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 22 Sep 2011 18:32:36 +0200
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: CVE Request: X.org ProcRenderGlyps input sanitation issue

Hi,

Also from 2010 and me@...fdog.net and the x.org bugtracker:

https://bugs.freedesktop.org/show_bug.cgi?id=28801

Adam in comment #c2 thinks this might just discloses memory
but could not overwrite arbitrary x server memory ... 
However the comment #c0 has a x.org server crash, so I am unsure
about code execution possibilities.

Needs one 2010 CVE id I guess.

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.