Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=646387be198190f30712e265bb622bc4ac92fb27
commit 646387be198190f30712e265bb622bc4ac92fb27 Author: voroskoi <[EMAIL PROTECTED]> Date: Tue Jan 15 19:57:42 2008 +0100 FSA344-cairo diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index ab3aeea..5069bee 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,19 @@ <fsas> <fsa> + <id>344</id> + <date>2008-01-15</date> + <author>voroskoi</author> + <package>cairo</package> + <vulnerable>1.4.10-1</vulnerable> + <unaffected>1.4.10-2sayshell1</unaffected> + <bts>http://bugs.frugalware.org/task/2654</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5503</cve> + <desc>A vulnerability has been reported in Cairo, which potentially can be exploited by malicious people to compromise an application using the library. + The vulnerability is caused due to an integer overflow error within the "read_png()" function in cairo-png.c. This can be exploited to cause a heap-based buffer overflow via a specially crafted PNG file. + Successful exploitation may allow execution of arbitrary code.</desc> + </fsa> + <fsa> <id>343</id> <date>2008-01-15</date> <author>voroskoi</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
