[Debian GNUstep maintainers] Bug#584401: CVE-2010-1620: Integer overflow

Giuseppe Iuculano iuculano at debian.org
Thu Jun 3 10:42:21 UTC 2010


Package: gnustep-base
Version: 1.19.3-3
Severity: serious
Tags: security

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for gnustep-base.

CVE-2010-1620[0]:
| Integer overflow in the load_iface function in Tools/gdomap.c in
| gdomap in GNUstep Base before 1.20.0 might allow context-dependent
| attackers to execute arbitrary code via a (1) file or (2) socket that
| provides configuration data with many entries, leading to a heap-based
| buffer overflow.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1620
    http://security-tracker.debian.org/tracker/CVE-2010-1620


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkwHhwoACgkQNxpp46476apFvQCePP+7hUwuYaOJmTnF6vHE9VBS
dBwAnj2OWTbudmv2cee0NuFPGe5u2FxC
=uNR0
-----END PGP SIGNATURE-----





More information about the pkg-GNUstep-maintainers mailing list