Darcsweb-Url: 
http://darcs.frugalware.org/darcsweb/darcsweb.cgi?r=homepage-ng;a=darcs_commitdiff;h=20061023224135-dd049-0c94de99208adb60c18760a823e66d3ca683f853.gz;

[FSA26-qt
voroskoi <[EMAIL PROTECTED]>**20061023224135] {
hunk ./frugalware/xml/security.xml 29
+       <fsa>
+               <id>26</id>
+               <date>2006-10-24</date>
+               <author>voroskoi</author>
+               <package>qt</package>
+               <vulnerable>3.3.6-4</vulnerable>
+               <unaffected>3.3.6-5</unaffected>
+               <bts>http://bugs.frugalware.org/task/1335</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811</cve>
+               <desc>A vulnerability has been reported in Qt, which can be 
exploited by malicious people to cause a DoS (Denial of Service) and 
potentially compromise an application using the library.
+                       The vulnerability is caused due to an integer overflow 
within the way Qt handles certain pixmap images. This can potentially be 
exploited to execute arbitrary code by e.g. causing an application linked 
against Qt to process a specially crafted pixmap image.</desc>
+       </fsa>
}
_______________________________________________
Frugalware-darcs mailing list
Frugalware-darcs@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-darcs

Reply via email to