Darcsweb-Url: 
http://darcs.frugalware.org/darcsweb/darcsweb.cgi?r=homepage-ng;a=darcs_commitdiff;h=20070125211547-dd049-73c6b4f1463db6737d3af31c496cb62eec4d071d.gz;

[FSA103-ed
voroskoi <[EMAIL PROTECTED]>**20070125211547] {
hunk ./frugalware/xml/security.xml 29
+       <fsa>
+               <id>103</id>
+               <date>2007-01-25</date>
+               <author>voroskoi</author>
+               <package>ed</package>
+               <vulnerable>0.2-2</vulnerable>
+               <unaffected>0.4-1siwenna1</unaffected>
+               <bts>http://bugs.frugalware.org/task/1638</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6939</cve>
+               <desc>A vulnerability has been reported in GNU ed, which can be 
exploited by malicious, local users to perform certain actions with escalated 
privileges.
+                       The vulnerability is caused due to temporary files 
being created insecurely. This can be exploited via symlink attacks to 
overwrite arbitrary files with the privileges of the user running ed.</desc>
+       </fsa>
}
_______________________________________________
Frugalware-darcs mailing list
Frugalware-darcs@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-darcs

Reply via email to