Please do not reply directly to this email. All additional comments should be made in the comments box of this bug report. Summary: CVE-2006-2480: dia format string vulnerability https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192538 ------- Additional Comments From j.w.r.degoede@xxxxxx 2006-05-20 08:38 EST ------- This comment of mine collided with John's comment, so its a bit stale: --- I've fixed this for FE using the patch attached to upstream's BZ (after checking / verifying it). And yes, this most definetly is a vulnerability. The current example of the string format vulnerability is rather harmless, but I _think_ it will be possbile to exploit this by getting people to open malformed files with dia. Also talking about dia, in my memory a security hole was found in one of the dia import filters during the 0.95 pre cycle, I dunno if dia 0.94 had this hole though (and my memory may be wrong altogther mixing up events). --- Now with John's new comment in mind, I guess the same goes for dia in FE? After seeing the BZ collision with your comment I tried to kill my builds of the fix, but I was too late a new version with the patch has been successfully build for FE-5 and devel. I guess thats what I get for being quick. Anyways what do we do now? Ask the new versions to be removed from the needsign and push queue? Or just release them and release again when you're done with your audit? -- Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.