From: David H. <dm...@us...> - 2004-08-05 11:45:52
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 ID: FINK-2004-08-04 Reported: 2004-08-04 Updated: 2004-08-04 Package: libpng3, libpng3-shlibs Affected: <= 1.2.5 Maintainer: Dave Morrison Trees: 10.3/stable, 10.3/unstable, 10.2-gcc3.3/stable, 10.2-gcc3.3/unstable Mac OS X version: 10.2, 10.3 Fix: upstream Updated by: maintainer (dm...@us...) Description: stack-based buffer overflow and other code concerns References: CVE Ref-URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597 References: MISC Ref-URL: http://scary.beasts.org/security/CESA-2004-001.txt References: CERT-VN Ref-URL: http://www.kb.cert.org/vuls/id/388984 References: CVE Ref-URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598 References: MISC Ref-URL: http://scary.beasts.org/security/CESA-2004-001.txt References: CERT-VN Ref-URL: http://www.kb.cert.org/vuls/id/236656 References: CVE Ref-URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599 References: MISC Ref-URL: http://scary.beasts.org/security/CESA-2004-001.txt References: CERT-VN Ref-URL: http://www.kb.cert.org/vuls/id/160448 References: CERT-VN Ref-URL: http://www.kb.cert.org/vuls/id/160448 References: CERT-VN Ref-URL: http://www.kb.cert.org/vuls/id/477512 To verify the authenticity please visit http://fink.sourceforge.net/doc/security/notification.php?phpLang=en#who -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.3.6 (Darwin) iD8DBQFBEh23PMoaMn4kKR4RA7VyAJ4qCStS24XOaNHK4zWuYwuGgZj6KQCfSJoX OOyc7ciasKKWuqMp2vuhofw= =MCOM -----END PGP SIGNATURE----- |