Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 23 Sep 2011 14:41:54 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: X.org ProcRenderGlyps input sanitation issue

Please use CVE-2010-4819

Thanks.

-- 
    JB

----- Original Message -----
> Hi,
> 
> Also from 2010 and me@...fdog.net and the x.org bugtracker:
> 
> https://bugs.freedesktop.org/show_bug.cgi?id=28801
> 
> Adam in comment #c2 thinks this might just discloses memory
> but could not overwrite arbitrary x server memory ...
> However the comment #c0 has a x.org server crash, so I am unsure
> about code execution possibilities.
> 
> Needs one 2010 CVE id I guess.
> 
> Ciao, Marcus
> 

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.