[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Request a security audit for my xiterm+thai package.



> I have no time auditing this bug one thing came to my mind 
> when I had a look in main.c:
> 1655   if ((display_name = getenv ("DISPLAY")) == NULL)
> 1656     display_name = ":0";
> 
> Please fix that code to print an error, see:
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1692 and
> http://article.gmane.org/gmane.comp.security.oss.general/122

Just review the CVE-2008-1692 and send the initial patch to the upstrem.
Now, the adjusted patch by the upstream developer is commited in the
upstream source. It will be in the next upstream release.

In the meantime, I will review another vulnerabilities.

Regards,
Neutron Soutmun

Attachment: signature.asc
Description: =?UTF-8?Q?=E0=B8=99=E0=B8=B5=E0=B9=88=E0=B8=84=E0=B8=B7=E0=B8=AD?= =?UTF-8?Q?=E0=B8=AA=E0=B9=88=E0=B8=A7=E0=B8=99=E0=B8=82=E0=B9=89?= =?UTF-8?Q?=E0=B8=AD=E0=B8=84=E0=B8=A7=E0=B8=B2=E0=B8=A1=E0=B8=97?= =?UTF-8?Q?=E0=B8=B5=E0=B9=88=E0=B8=A1=E0=B8=B5=E0=B8=A5=E0=B8=B2?= =?UTF-8?Q?=E0=B8=A2=E0=B9=80=E0=B8=8B=E0=B9=87=E0=B8=99=E0=B8=94?= =?UTF-8?Q?=E0=B8=B4=E0=B8=88=E0=B8=B4=E0=B8=97=E0=B8=B1=E0=B8=A5?= =?UTF-8?Q?=E0=B8=81=E0=B8=B3=E0=B8=81=E0=B8=B1=E0=B8=9A?=


Reply to: