Bug 632978 (CVE-2009-4996)
Summary: | CVE-2009-4996 Xfce-session4: Screen not locked after resume from suspend / hibernate launched from xfce4-session-logout | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | christoph.wickert, collura, hwj, kevin |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-08-22 16:11:02 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 525395, 587633, 614608 | ||
Bug Blocks: |
Description
Jan Lieskovsky
2010-09-12 10:34:47 UTC
Who requested this CVE? Has there been any attempt to contact upstream? If not, why doesn't RH Security response not do this? Hi Christoph, this CVE was assigned recently by Mitre: [1] http://cve.mitre.org/ The very only purpose this Red Hat Bugzilla entry has been filed for is to track the particular CVE id for future purpose (for case some of the customers will ask for information regarding it) and perform its further research (to determine if the described behavior can impersonate a security threat). It is possible after the research is complete, this bug will be closed (with appropriate resolution). But till that moment we need to track it and need a way how to reference it. Hope this helps. Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team Thanks for your reply, Jan. (In reply to comment #2) > this CVE was assigned recently by Mitre: AFAIK there usually is somebody to *request* the CVE from Mitre before it gets actually assigned. I would have expected this person to contact upstream first (which I did in the meantime). Jan, can you tell me who actually requested the CVE? Hi Christoph, unfortunately I can't. We found out about this report from new CVE-2009-4996 CVE identifier description from the Mitre CVE database, once it was assigned. So I do not know on which basis this was assigned. But when looking at the CVE-2009-4996 references: [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4996 it looks the earliest entry, which (probably) went to CVE assignment is the upstream bug report: [2] https://bugzilla.xfce.org/show_bug.cgi?id=4805 But you can privately check with Steven Christey of Mitre to be definitely sure about the catalyst which went to the assignment. Hope this helps. Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team (In reply to comment #4) > Jan, can you tell me who actually requested the CVE? A solution make be from this other related solution: https://github.com/linuxmint/cinnamon/issues/4324#issuecomment-1685426989 |