[Debian GNUstep maintainers] Bug#584401: CVE-2010-1620: Integer overflow
Giuseppe Iuculano
iuculano at debian.org
Thu Jun 3 10:42:21 UTC 2010
Package: gnustep-base
Version: 1.19.3-3
Severity: serious
Tags: security
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for gnustep-base.
CVE-2010-1620[0]:
| Integer overflow in the load_iface function in Tools/gdomap.c in
| gdomap in GNUstep Base before 1.20.0 might allow context-dependent
| attackers to execute arbitrary code via a (1) file or (2) socket that
| provides configuration data with many entries, leading to a heap-based
| buffer overflow.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1620
http://security-tracker.debian.org/tracker/CVE-2010-1620
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkwHhwoACgkQNxpp46476apFvQCePP+7hUwuYaOJmTnF6vHE9VBS
dBwAnj2OWTbudmv2cee0NuFPGe5u2FxC
=uNR0
-----END PGP SIGNATURE-----
More information about the pkg-GNUstep-maintainers
mailing list