Summary: | gnome-extra/libgsf buffer overflow (CVE-2006-4514) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sune Kloppenborg Jeppesen (RETIRED) <jaervosz> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | gnome |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.debian.org/security/2006/dsa-1221 | ||
Whiteboard: | B2 [glsa] DerCorny | ||
Package list: | Runtime testing required: | --- |
Description
Sune Kloppenborg Jeppesen (RETIRED)
2006-11-30 09:18:58 UTC
Additional info: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=446 Upstreams patch: http://cvs.gnome.org/viewcvs/libgsf/gsf/gsf-infile-msole.c?r1=1.73&r2=1.74 But there are also new upstream versions. Gnome team please provide new ebuilds, thanks libgsf 1.14.2 was already in portage and since there are no open issues concerning it, I see no problem putting it up for stabilisation. arches, please test and stable libgsf-1.14.2. thanks! @Stefan, perhaps it is easer for arches if we actually call them ;-) Target keywords are: libgsf-1.14.2.ebuild:KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sh sparc x86" x86 done sparc stable. ppc stable ppc64 stable Stable for HPPA. amd64 stable Alpha gives a bit of love here. GLSA 200612-13 ia64 done |