[<prev] [next>] [day] [month] [year] [list]
Message-ID: <460b2a3b.RMXkeGOQHPQD6W+o%announce-noreply@rpath.com>
Date: Wed, 28 Mar 2007 22:53:47 -0400
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: rPSA-2007-0061-1 inkscape
rPath Security Advisory: 2007-0061-1
Published: 2007-03-28
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
Updated Versions:
inkscape=/conary.rpath.com@rpl:devel//1/0.45.1-0.1-1
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1463
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1464
https://issues.rpath.com/browse/RPL-1170
Description:
Previous versions of the inkscape package may execute arbitrary code
when provided with certain strings, particularly when provided with
a maliciously-crafted URI. This vulnerability could have been
exposed for users who configured a browser to open certain document
types with inkscape.
Another vulnerability fixed in this version of inkscape involves
the Whiteboard Jabber client, but this functionality was not
included in the previous version of inkscape included in rPath
Linux, so it was not vulnerable.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists