Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=73db96b76c04b18d53bbf777f5adb8e9b43a2908

commit 73db96b76c04b18d53bbf777f5adb8e9b43a2908
Author: Miklos Vajna <[email protected]>
Date:   Mon Mar 9 23:39:14 2009 +0100

FSA580-imlib2

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index a9e9af7..a42017e 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,19 @@

<fsas>
<fsa>
+               <id>580</id>
+               <date>2009-03-09</date>
+               <author>Miklos Vajna</author>
+               <package>imlib2</package>
+               <vulnerable>1.4.1-1</vulnerable>
+               <unaffected>1.4.1-2solaria1</unaffected>
+               <bts>http://bugs.frugalware.org/task/3484</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5187</cve>
+               <desc>A vulnerability has been discovered in imlib2, which can 
be exploited by malicious people to potentially compromise an application using 
the library.
+                       The vulnerability is caused due to a pointer arithmetic 
error within the "load()" function provided by the XPM loader. This can be 
exploited to cause a heap-based buffer overflow via a specially crafted XPM 
file.
+                       Successful exploitation may allow execution of 
arbitrary code.</desc>
+       </fsa>
+       <fsa>
<id>579</id>
<date>2009-03-09</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to