Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=821b49684a7fd94226e572725ef5c2c0ac55360c

commit 821b49684a7fd94226e572725ef5c2c0ac55360c
Author: Miklos Vajna <vmik...@frugalware.org>
Date:   Sun May 3 12:23:42 2009 +0200

FSA593-blender

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index ca0241a..51c6140 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -26,6 +26,18 @@

<fsas>
<fsa>
+               <id>593</id>
+               <date>2009-05-03</date>
+               <author>Miklos Vajna</author>
+               <package>blender</package>
+               <vulnerable>2.48a-1</vulnerable>
+               <unaffected>2.48a-2anacreon1</unaffected>
+               <bts>http://bugs.frugalware.org/task/3726</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4863</cve>
+               <desc>A vulnerability has been reported in Blender, which can 
be exploited by malicious, local users to gain escalated privileges.
+                       The vulnerability is caused due to Blender using the 
current working directory as part of the module search path, which can be 
exploited to e.g. execute arbitrary Python code with the privileges of another 
user by tricking the user into executing Blender in a directory containing a 
Python file named like one of the modules Blender uses.</desc>
+       </fsa>
+       <fsa>
<id>592</id>
<date>2009-05-03</date>
<author>Miklos Vajna</author>
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to