Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=646387be198190f30712e265bb622bc4ac92fb27

commit 646387be198190f30712e265bb622bc4ac92fb27
Author: voroskoi <[EMAIL PROTECTED]>
Date:   Tue Jan 15 19:57:42 2008 +0100

FSA344-cairo

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index ab3aeea..5069bee 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,19 @@

<fsas>
<fsa>
+               <id>344</id>
+               <date>2008-01-15</date>
+               <author>voroskoi</author>
+               <package>cairo</package>
+               <vulnerable>1.4.10-1</vulnerable>
+               <unaffected>1.4.10-2sayshell1</unaffected>
+               <bts>http://bugs.frugalware.org/task/2654</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503</cve>
+               <desc>A vulnerability has been reported in Cairo, which 
potentially can be exploited by malicious people to compromise an application 
using the library.
+                       The vulnerability is caused due to an integer overflow 
error within the "read_png()" function in cairo-png.c. This can be exploited to 
cause a heap-based buffer overflow via a specially crafted PNG file.
+                       Successful exploitation may allow execution of 
arbitrary code.</desc>
+       </fsa>
+       <fsa>
<id>343</id>
<date>2008-01-15</date>
<author>voroskoi</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to