Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=892cd34df0865cfe3e2f2bcc473126e1789a2126
commit 892cd34df0865cfe3e2f2bcc473126e1789a2126 Author: voroskoi <[EMAIL PROTECTED]> Date: Thu Sep 6 21:17:44 2007 +0200 FSA264-terminal diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 46d71a7..b4e28f8 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,18 @@ <fsas> <fsa> + <id>264</id> + <date>2007-09-06</date> + <author>voroskoi</author> + <package>terminal</package> + <vulnerable>0.2.6-1</vulnerable> + <unaffected>0.2.6-2terminus1</unaffected> + <bts>http://bugs.frugalware.org/task/2256</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3770</cve> + <desc>Lasse Karkkainen has reported a security issue in Xfce Terminal, which can be exploited by malicious people to inject shell commands. + The "terminal_helper_execute()" function in terminal/terminal.c uses "/bin/sh -c" to spawn the browser process. This can be used to disclose sensitive information or execute shell commands by e.g. tricking a user into opening a malicious link using the "Open Link" functionality.</desc> + </fsa> + <fsa> <id>263</id> <date>2007-09-06</date> <author>voroskoi</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
