Re: [oss-security] xterm terminal crash due to malicious character sequences in file name

2025-08-16 Thread Solar Designer
On Sun, Aug 17, 2025 at 03:09:58AM +0200, Vincent Lefevre wrote: > Note: I didn't receive Erik's message. The logs of my mail server > says that 193.110.157.244 was blacklisted by zen.spamhaus.org and > dnsbl.ahbl.org. Rather annoying... I'm unsure we want a list admin topic in this same thread, b

Re: [oss-security] xterm terminal crash due to malicious character sequences in file name

2025-08-16 Thread Vincent Lefevre
Note: I didn't receive Erik's message. The logs of my mail server says that 193.110.157.244 was blacklisted by zen.spamhaus.org and dnsbl.ahbl.org. Rather annoying... On 2025-08-16 11:47:43 -0700, Collin Funk wrote: > Hi Erik, > > Erik Auerswald said: > > > On Wed, Aug 13, 2025 at 07:00:58PM +0

Re: [oss-security] xterm terminal crash due to malicious character sequences in file name

2025-08-16 Thread Collin Funk
Hi Erik, Erik Auerswald said: > On Wed, Aug 13, 2025 at 07:00:58PM +0200, Vincent Lefevre wrote: > > The following makes the xterm terminal crash > > > > touch "$(printf "file\e[H\e[c\n\b")" > > gunzip file* > > > > due to malicious character sequences in the file name and a bug in > > xte

Re: [oss-security] HTTP/2 implementations are vulnerable to "MadeYouReset" DoS attack through HTTP/2 control frames

2025-08-16 Thread Alan Coopersmith
On 8/13/25 11:27, Alan Coopersmith wrote: https://kb.cert.org/vuls/id/767506 was published today: HTTP/2 implementations are vulnerable to "MadeYouReset" DoS attack  through HTTP/2 control frames Vulnerability Note VU#767506 Original Release Date: 2025-08-13 | Last Revised: 2025-08-13 Overview