Darcsweb-Url: http://darcs.frugalware.org/darcsweb/darcsweb.cgi?r=homepage-ng;a=darcs_commitdiff;h=20061023224135-dd049-0c94de99208adb60c18760a823e66d3ca683f853.gz;
[FSA26-qt voroskoi <[EMAIL PROTECTED]>**20061023224135] { hunk ./frugalware/xml/security.xml 29 + <fsa> + <id>26</id> + <date>2006-10-24</date> + <author>voroskoi</author> + <package>qt</package> + <vulnerable>3.3.6-4</vulnerable> + <unaffected>3.3.6-5</unaffected> + <bts>http://bugs.frugalware.org/task/1335</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811</cve> + <desc>A vulnerability has been reported in Qt, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. + The vulnerability is caused due to an integer overflow within the way Qt handles certain pixmap images. This can potentially be exploited to execute arbitrary code by e.g. causing an application linked against Qt to process a specially crafted pixmap image.</desc> + </fsa> } _______________________________________________ Frugalware-darcs mailing list Frugalware-darcs@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-darcs