diff options
Diffstat (limited to 'metadata/glsa/glsa-200801-06.xml')
-rw-r--r-- | metadata/glsa/glsa-200801-06.xml | 82 |
1 files changed, 82 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-200801-06.xml b/metadata/glsa/glsa-200801-06.xml new file mode 100644 index 000000000000..140156b28995 --- /dev/null +++ b/metadata/glsa/glsa-200801-06.xml @@ -0,0 +1,82 @@ +<?xml version="1.0" encoding="utf-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> + +<glsa id="200801-06"> + <title>Xfce: Multiple vulnerabilities</title> + <synopsis> + Multiple vulnerabilities in Xfce might allow user-assisted attackers to + execute arbitrary code. + </synopsis> + <product type="ebuild">xfce4-panel libxfcegui4</product> + <announced>January 09, 2008</announced> + <revised>January 10, 2008: 03</revised> + <bug>201292</bug> + <bug>201293</bug> + <access>remote</access> + <affected> + <package name="xfce-base/xfce4-panel" auto="yes" arch="*"> + <unaffected range="ge">4.4.2</unaffected> + <vulnerable range="lt">4.4.2</vulnerable> + </package> + <package name="xfce-base/libxfcegui4" auto="yes" arch="*"> + <unaffected range="ge">4.4.2</unaffected> + <vulnerable range="lt">4.4.2</vulnerable> + </package> + </affected> + <background> + <p> + Xfce is a GTK+ 2 based desktop environment that allows to run a modern + desktop environment on modest hardware. + </p> + </background> + <description> + <p> + Gregory Andersen reported that the Xfce4 panel does not correctly + calculate memory boundaries, leading to a stack-based buffer overflow + in the launcher_update_panel_entry() function (CVE-2007-6531). Daichi + Kawahata reported libxfcegui4 did not copy provided values when + creating "SessionClient" structs, possibly leading to access of freed + memory areas (CVE-2007-6532). + </p> + </description> + <impact type="normal"> + <p> + A remote attacker could entice a user to install a specially crafted + "rc" file to execute arbitrary code via long strings in the "Name" and + "Comment" fields or via unspecified vectors involving the second + vulnerability. + </p> + </impact> + <workaround> + <p> + There is no known workaround at this time. + </p> + </workaround> + <resolution> + <p> + All Xfce4 panel users should upgrade to the latest version: + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=xfce-base/xfce4-panel-4.4.2"</code> + <p> + All libxfcegui4 users should upgrade to the latest version: + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=xfce-base/libxfcegui4-4.4.2"</code> + </resolution> + <references> + <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6531">CVE-2007-6531</uri> + <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6532">CVE-2007-6532</uri> + </references> + <metadata tag="requester" timestamp="Sat, 08 Dec 2007 23:45:36 +0000"> + p-y + </metadata> + <metadata tag="bugReady" timestamp="Sat, 22 Dec 2007 13:22:06 +0000"> + rbu + </metadata> + <metadata tag="submitter" timestamp="Sat, 22 Dec 2007 16:37:18 +0000"> + rbu + </metadata> +</glsa> |