| Summary: | pinpoint new integer overflow security issue (CVE-2013-7447) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | lewyssmith, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/675834/ | ||
| Whiteboard: | has_procedure advisory MGA5-64-OK | ||
| Source RPM: | pinpoint | CVE: | |
| Status comment: | |||
| Bug Depends on: | |||
| Bug Blocks: | 17731 | ||
|
Description
David Walser
2016-02-12 20:18:54 CET
Testing M5 x64 real h/w: OK Installed issued pinpoint-0.1.4-18.mga5 Difficult to find out about it. Here is the info: https://wiki.gnome.org/action/show/Apps/Pinpoint?action=show&redirect=Pinpoint and here is the link to a sample script (embedded in the page): http://git.gnome.org/browse/pinpoint/tree/introduction.pin Copy-paste the script to a local file, and edit each *.jpg image reference to a local image. The 'bg' one gets used most. No man page, use $ pinpoint -h for detailed info. Could not find a menu entry for it. Do: $ pinpoint <script filename> It worked (space|down|right to advance). It is quite interesting! Updated to: pinpoint-0.1.4-18.1.mga5 and the presentation worked exactly as previously. Update OK. CC:
(none) =>
lewyssmith Useful package. Validating. Advisory uploaded. Please push to 5 updates, thanks. Keywords:
(none) =>
validated_update
David Walser
2016-02-16 20:25:17 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/675834/ An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2016-0073.html Status:
NEW =>
RESOLVED |