Login
Newsletter
Werbung

Sicherheit: Zahlenüberlauf in gnash
Aktuelle Meldungen Distributionen
Name: Zahlenüberlauf in gnash
ID: FEDORA-2012-4032
Distribution: Fedora
Plattformen: Fedora 16
Datum: Mo, 26. März 2012, 20:43
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1175
Applikationen: gnash

Originalnachricht

Name        : gnash
Product : Fedora 16
Version : 0.8.10
Release : 2.fc16
URL : http://www.gnu.org/software/gnash/
Summary : GNU flash movie player
Description :
Gnash is capable of reading up to SWF v9 files and op-codes, but primarily
supports SWF v7, with better SWF v8 and v9 support under heavy development.
Gnash includes initial parser support for SWF v8 and v9. Not all
ActionScript 2 classes are implemented yet, but all of the most heavily
used ones are. Many ActionScript 2 classes are partially implemented;
there is support for all of the commonly used methods of each
class.

-------------------------------------------------------------------------------
-
Update Information:

Fix CVE-2012-1175
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Mar 15 2012 Hicham HAOUARI <hicham.haouari@gmail.com> - 1:0.8.10-2
- Fix CVE-2012-1175 ( rhbz #803443 #803444 )
* Mon Feb 27 2012 Hicham HAOUARI <hicham.haouari@gmail.com> - 1:0.8.10-1
- Update to 0.8.10
- Drop patches backported from upstream
* Thu Jan 26 2012 Hicham HAOUARI <hicham.haouari@gmail.com> - 1:0.8.9-9
- Add unistd.h header ( http://www.mail-archive.com/gcc-bugs@gcc.gnu.org/msg338792.html )
- Backport patch from upstream that replaces xulrunner-headers patch
( http://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commit;h=35dde18 )
* Fri Jan 13 2012 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 1:0.8.9-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild
* Mon Nov 21 2011 Daniel Drake <dsd@laptop.org> - 1:0.8.9-7
- Add patch to fix compile with new xulrunner
* Mon Nov 21 2011 Peter Robinson <pbrobinson@fedoraproject.org> -
1:0.8.9-6
- Rebuild for boost 1.48
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #803443 - CVE-2012-1175 gnash: integer overflow vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=803443
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update gnash' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung