Gentoo Archives: gentoo-commits

From: "Sean Amoss (ackle)" <ackle@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201207-08.xml
Date: Mon, 09 Jul 2012 23:32:18
Message-Id: 20120709233158.A0E5420063@flycatcher.gentoo.org
1 ackle 12/07/09 23:31:57
2
3 Added: glsa-201207-08.xml
4 Log:
5 GLSA 201207-08
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-201207-08.xml
9
10 file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201207-08.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201207-08.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-201207-08.xml
14 ===================================================================
15 <?xml version="1.0" encoding="UTF-8"?>
16 <?xml-stylesheet type="text/xsl" href="/xsl/glsa.xsl"?>
17 <?xml-stylesheet type="text/xsl" href="/xsl/guide.xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19 <glsa id="201207-08">
20 <title>Gnash: Multiple vulnerabilities</title>
21 <synopsis>Multiple vulnerabilities have been found in Gnash which could
22 result in execution of arbitrary code, Denial of Service, or information
23 disclosure.
24 </synopsis>
25 <product type="ebuild">Gnash</product>
26 <announced>July 09, 2012</announced>
27 <revised>July 09, 2012: 1</revised>
28 <bug>391283</bug>
29 <bug>408209</bug>
30 <access>local, remote</access>
31 <affected>
32 <package name="www-plugins/gnash" auto="yes" arch="*">
33 <unaffected range="ge">0.8.10-r2</unaffected>
34 <vulnerable range="lt">0.8.10-r2</vulnerable>
35 </package>
36 </affected>
37 <background>
38 <p>Gnash is a GNU flash movie player that supports many SWF features.</p>
39 </background>
40 <description>
41 <p>Multiple vulnerabilities have been found in Gnash:</p>
42
43 <ul>
44 <li>The "nsPluginInstance::setupCookies()" function in plugin.cpp creates
45 world-readable cookies with predictable file names (CVE-2011-4328).
46 </li>
47 <li>The "GnashImage::size()" function in GnashImage.h contains an integer
48 overflow error which could cause a heap-based buffer overflow
49 (CVE-2012-1175).
50 </li>
51 </ul>
52 </description>
53 <impact type="normal">
54 <p>A remote attacker could entice a user to open a specially crafted SWF
55 file, possibly resulting in execution of arbitrary code or a Denial of
56 Service condition. Furthermore, a local attacker may be able to obtain
57 sensitive information.
58 </p>
59 </impact>
60 <workaround>
61 <p>There is no known workaround at this time.</p>
62 </workaround>
63 <resolution>
64 <p>All Gnash users should upgrade to the latest version:</p>
65
66 <code>
67 # emerge --sync
68 # emerge --ask --oneshot --verbose "&gt;=www-plugins/gnash-0.8.10-r2"
69 </code>
70 </resolution>
71 <references>
72 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4328">CVE-2011-4328</uri>
73 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1175">CVE-2012-1175</uri>
74 </references>
75 <metadata timestamp="Sat, 17 Mar 2012 23:44:44 +0000" tag="requester">ackle</metadata>
76 <metadata timestamp="Mon, 09 Jul 2012 23:29:06 +0000" tag="submitter">ackle</metadata>
77 </glsa>