Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=4bd4f8d024347ac202aa888c1b7cfc760257a2ff
commit 4bd4f8d024347ac202aa888c1b7cfc760257a2ff Author: kikadf <[email protected]> Date: Wed Aug 20 11:18:34 2014 +0200 Add FSA for lzo diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 6e8a58b..4bb893f 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -39,6 +39,17 @@ <fsas> <fsa> + <id>872</id> + <date>2014-08-20</date> + <author>kikadf</author> + <package>lzo</package> + <vulnerable>2.0.6-1</vulnerable> + <unaffected>2.0.6-1arcturus1</unaffected> + <bts></bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607</cve> + <desc>Don A. Bailey from Lab Mouse Security discovered an integer overflow flaw in the way the lzo library decompressed certain archives compressed with the LZO algorithm. An attacker could create a specially crafted LZO-compressed input that, when decompressed by an application using the lzo library, would cause that application to crash or, potentially, execute arbitrary code.</desc> + </fsa> + <fsa> <id>871</id> <date>2014-08-20</date> <author>kikadf</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
