Package: gnustep-base Version: 1.19.3-3 Severity: serious Tags: security -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for gnustep-base. CVE-2010-1620[0]: | Integer overflow in the load_iface function in Tools/gdomap.c in | gdomap in GNUstep Base before 1.20.0 might allow context-dependent | attackers to execute arbitrary code via a (1) file or (2) socket that | provides configuration data with many entries, leading to a heap-based | buffer overflow. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1620 http://security-tracker.debian.org/tracker/CVE-2010-1620 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkwHhwoACgkQNxpp46476apFvQCePP+7hUwuYaOJmTnF6vHE9VBS dBwAnj2OWTbudmv2cee0NuFPGe5u2FxC =uNR0 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

