[Bug 192538] CVE-2006-2480: dia format string vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.

Summary: CVE-2006-2480: dia format string vulnerability


https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192538





------- Additional Comments From j.w.r.degoede@xxxxxx  2006-05-20 08:38 EST -------
This comment of mine collided with John's comment, so its a bit stale:

---

I've fixed this for FE using the patch attached to upstream's BZ (after checking
/ verifying it).

And yes, this most definetly is a vulnerability. The current example of the
string format vulnerability is rather harmless, but I _think_ it will be
possbile to exploit this by getting people to open malformed files with dia.

Also talking about dia, in my memory a security hole was found in one of the dia
import filters during the 0.95 pre cycle, I dunno if dia 0.94 had this hole
though (and my memory may be wrong altogther mixing up events).

---

Now with John's new comment in mind, I guess the same goes for dia in FE?
After seeing the BZ collision with your comment I tried to kill my builds of the
fix, but I was too late a new version with the patch has been successfully build
for FE-5 and devel. I guess thats what I get for being quick.

Anyways what do we do now? Ask the new versions to be removed from the needsign
and push queue? Or just release them and release again when you're done with
your audit?


-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Coolkey]

  Powered by Linux