From Mageia wiki
Jump to: navigation, search

MGASA-2012-0108-2

Date: June 10th, 2012
Affected releases: 1


Description:
Updated gnash packages fix security vulnerabilities:

Tielei Wang from Georgia Tech Information Security Center discovered a
vulnerability in GNU Gnash which is caused due to an integer overflow
error and can be exploited to cause a heap-based buffer overflow by
tricking a user into opening a specially crafted SWF file (CVE-2012-1175).

Alexander Kurtz discovered an unsafe management of HTTP cookies.
Cookie files are stored under /tmp and have predictable names, and the
vulnerability allows a local attacker to overwrite arbitrary files the
users has write permissions for, and are also world-readable which may
cause information leak (CVE-2011-4328).

UPDATE:
This advisory is updated to correct text errors that incorrectly
listed the updated packages as affected ones.


Updated Packages:
gnash-0.8.9-2.1.mga1
lib(64)gnash0-0.8.9-2.1.mga1
lib(64)gnash-devel-0.8.9-2.1.mga1
gnash-firefox-plugin-0.8.9-2.1.mga1
klash-0.8.9-2.1.mga1
gnash-cygnal-0.8.9-2.1.mga1
gnash-tools-0.8.9-2.1.mga1
python-gnash-0.8.9-2.1.mga1
gnash-extension-fileio-0.8.9-2.1.mga1
gnash-extension-lirc-0.8.9-2.1.mga1
gnash-extension-dejagnu-0.8.9-2.1.mga1
gnash-extension-mysql-0.8.9-2.1.mga1


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4328
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1175
http://www.debian.org/security/2012/dsa-2435
https://bugs.mageia.org/show_bug.cgi?id=5458