Currently entered into the bugzilla at: https://bugzilla.fedora.us/show_bug.cgi?id=1187 I'm curious whether the community thinks this is a necessary patch? Thanks. -jason --------------------------------------------------------------------- Patched SRPMS for screen buffer overflow Details at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0972 http://marc.theaimsgroup.com/?l=bugtraq&m=106995837813873&w=2 RH 7.3 https://mail.codegrinder.com/www/screen-3.9.11-4.legacy.src.rpm RH 7.2 https://mail.codegrinder.com/www/screen-3.9.9-4.legacy.src.rpm MD5SUM https://mail.codegrinder.com/www/screen-md5sums.asc The 7.3 rpms work for me.. I don't have a 7.2 box available to test that one. The default in 7.3 is to not suid the screen binary, so I think we're safe from privilege escalation (unless the user does it of their own volition). But, I am a bit concerned with the idea that someone could hijack my screen session. So, is this a patch we want to push? If so, we should patch the RH8 rpms as well. RH hasn't yet released a patch for 9, though it has a vulnerable version.
Attachment:
pgp00151.pgp
Description: PGP signature