oss-sec mailing list archives
Re: ncurses fixes upstream
From: Tavis Ormandy <taviso () gmail com>
Date: Fri, 14 Apr 2023 19:35:07 -0000 (UTC)
On 2023-04-13, Mark Esler wrote:
When you publish the CVE json5, you can references the patch URL and relevant bug discussions to help downstream. Including the CVE number in the patch commit is also quite helpful. Thank you!We've reached out to Arch, RedHat, Canonical and other popular distros independently.
I'm curious what the attack is! ISTR that terminfo definitions can contain shell commands by design and so are generally considered trusted. I remember using this trick in an exploit once :) $ printf "exploit, iprog=/usr/bin/id,\n" | tic - $ TERM=exploit reset uid=1000(taviso) gid=1000(taviso) Tavis. -- _o) $ lynx lock.cmpxchg8b.com /\\ _o) _o) $ finger taviso () sdf org _\_V _( ) _( ) @taviso
Current thread:
- ncurses fixes upstream Jonathan Bar Or (JBO) (Apr 12)
- Re: ncurses fixes upstream Sam James (Apr 13)
- Re: ncurses fixes upstream Georgi Guninski (Apr 15)
- Re: ncurses fixes upstream Solar Designer (Apr 15)
- Re: ncurses fixes upstream Georgi Guninski (Apr 15)
- Re: ncurses fixes upstream alice (Apr 13)
- Re: ncurses fixes upstream Mark Esler (Apr 13)
- Re: ncurses fixes upstream Tavis Ormandy (Apr 14)
- Re: ncurses fixes upstream Carlos López (Apr 19)
- RE: [EXTERNAL] Re: [oss-security] ncurses fixes upstream Jonathan Bar Or (JBO) (Apr 19)
- Re: ncurses fixes upstream Solar Designer (Apr 19)
- Re: ncurses fixes upstream Tavis Ormandy (Apr 20)
- Re: ncurses fixes upstream Sevan Janiyan (Apr 21)
- RE: [EXTERNAL] Re: [oss-security] ncurses fixes upstream Jonathan Bar Or (JBO) (Apr 19)
- Re: ncurses fixes upstream Sam James (Apr 13)