[Bug 215136] CVE-2006-5864: gv <= 3.6.2 stack-based buffer overflow

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.

Summary: CVE-2006-5864: gv <= 3.6.2 stack-based buffer overflow


https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=215136


michal@xxxxxxxxxxxx changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Severity|normal                      |high
                 CC|                            |michal@xxxxxxxxxxxx




------- Additional Comments From michal@xxxxxxxxxxxx  2006-12-04 12:09 EST -------
Mandriva Linux Security Advisory, MDKSA-2006:214-1, says the following:

"The patch used in the previous update still left the possibility of
 causing X to consume unusual amounts of memory if gv is used to view a
 carefully crafted image designed to exploit CVE-2006-5864. This update
 uses an improved patch to address this issue."

For patches see, for example, gv-3.6.1-4.3.20060mdk.src.rpm

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864

-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.

--
Fedora-security-list mailing list
Fedora-security-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-security-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Coolkey]

  Powered by Linux