Debian security advisory
- From: Leonard den Ottolander <leonard den ottolander nl>
 
- To: MC Devel <mc-devel gnome org>
 
- Cc: 
 
- Subject: Debian security advisory
 
- Date: Sun, 30 Jan 2005 14:34:45 +0100
 
Hi,
http://www.debian.org/security/2005/dsa-639 states a bunch of
vulnerabilities that are supposed to be fixed in CVS (they seem to have
overseen CAN-2004-0494 however). These vulnerabilities at least affect
users of mc-4.5.55 and before. The question is when have these been
fixed in CVS? Are they relevant to users of 4.6.0?
    * CAN-2004-1004
      Multiple format string vulnerabilities
    * CAN-2004-1005
      Multiple buffer overflows
    * CAN-2004-1009
      One infinite loop vulnerability
    * CAN-2004-1090
      Denial of service via corrupted section header
    * CAN-2004-1091
      Denial of service via null dereference
    * CAN-2004-1092
      Freeing unallocated memory
    * CAN-2004-1093
      Denial of service via use of already freed memory
    * CAN-2004-1174
      Denial of service via manipulating non-existing file handles
    * CAN-2004-1175
      Unintended program execution via insecure filename quoting
    * CAN-2004-1176
      Denial of service via a buffer underflow
Leonard.
-- 
mount -t life -o ro /dev/dna /genetic/research
[
Date Prev][
Date Next]   [
Thread Prev][
Thread Next]   
[
Thread Index]
[
Date Index]
[
Author Index]