Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=4bd4f8d024347ac202aa888c1b7cfc760257a2ff

commit 4bd4f8d024347ac202aa888c1b7cfc760257a2ff
Author: kikadf <[email protected]>
Date:   Wed Aug 20 11:18:34 2014 +0200

Add FSA for lzo

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 6e8a58b..4bb893f 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -39,6 +39,17 @@

<fsas>
<fsa>
+               <id>872</id>
+               <date>2014-08-20</date>
+               <author>kikadf</author>
+               <package>lzo</package>
+               <vulnerable>2.0.6-1</vulnerable>
+               <unaffected>2.0.6-1arcturus1</unaffected>
+               <bts></bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607</cve>
+               <desc>Don A. Bailey from Lab Mouse Security discovered an 
integer overflow flaw in the way the lzo library decompressed certain archives 
compressed with the LZO algorithm. An attacker could create a specially crafted 
LZO-compressed input that, when decompressed by an application using the lzo 
library, would cause that application to crash or, potentially, execute 
arbitrary code.</desc>
+       </fsa>
+       <fsa>
<id>871</id>
<date>2014-08-20</date>
<author>kikadf</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to