Summary: | <media-gfx/xfig-3.2.5b-r1: Stack Overflow via Crafted FIG Files (CVE-2010-4262) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | pva |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=659676 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
2010-12-10 07:12:18 UTC
Thank you for report Tim. I've applied patch in 3.2.5b-r1. Arch teams, please stabilize, together with transfig-3.2.5d (xfig depends on transfig and thus it's good idea to stabilize them together). Target keywords: media-gfx/transfig-3.2.5d: alpha amd64 ia64 ppc64 sparc x86 hppa ppc media-gfx/xfig-3.2.5b-r1: alpha amd64 hppa ppc ppc64 sparc x86 amd64 ok amd64 stable. Thank you Agostino. x86 stable Stable on alpha. ia64/sparc stable Stable for HPPA. ppc64 done ppc done Thanks, everyone. GLSA Vote: Yes. CVE-2010-4262 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4262): Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a FIG image with a crafted color definition. Vote: yes, GLSA request filed. This issue was resolved and addressed in GLSA 201312-16 at http://security.gentoo.org/glsa/glsa-201312-16.xml by GLSA coordinator Sergey Popov (pinkbyte). |