Giuseppe Iuculano
2010-Jun-03 10:42 UTC
[Secure-testing-team] Bug#584401: CVE-2010-1620: Integer overflow
Package: gnustep-base Version: 1.19.3-3 Severity: serious Tags: security -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for gnustep-base. CVE-2010-1620[0]: | Integer overflow in the load_iface function in Tools/gdomap.c in | gdomap in GNUstep Base before 1.20.0 might allow context-dependent | attackers to execute arbitrary code via a (1) file or (2) socket that | provides configuration data with many entries, leading to a heap-based | buffer overflow. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1620 http://security-tracker.debian.org/tracker/CVE-2010-1620 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkwHhwoACgkQNxpp46476apFvQCePP+7hUwuYaOJmTnF6vHE9VBS dBwAnj2OWTbudmv2cee0NuFPGe5u2FxC =uNR0 -----END PGP SIGNATURE-----