pkgsrc/graphics/libwmf
salo 8f7a834d4e Security fix for CVE-2006-3376:
"A vulnerability in libwmf can be potentially exploited by malicious
 people to compromise an application using the vulnerable library.

 The vulnerability is caused due to an integer overflow error when
 allocating memory based on a value taken directly from a WMF file
 without performing any checks. This can be exploited to cause a
 heap-based buffer overflow when a specially crafted WMF file is
 processed.

 Successful exploitation may allow execution of arbitrary code."

http://secunia.com/advisories/20921/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376

Patch from Red Hat.  Bump PKGREVISION.
2006-08-20 21:38:45 +00:00
..
patches Security fix for CVE-2006-3376: 2006-08-20 21:38:45 +00:00
buildlink3.mk Change the format of BUILDLINK_ORDER to contain depth information as well, 2006-07-08 23:10:35 +00:00
DESCR libwmf developer told me that xwmf is part of libwmf 2004-03-22 17:20:28 +00:00
distinfo Security fix for CVE-2006-3376: 2006-08-20 21:38:45 +00:00
hacks.mk added hack to compile libwmf on IRIX 5.3 2006-01-29 21:58:31 +00:00
Makefile Security fix for CVE-2006-3376: 2006-08-20 21:38:45 +00:00
MESSAGE Removed trailing white-space. 2005-09-28 14:15:48 +00:00
PLIST Changes 0.2.8.4: 2006-01-18 22:04:58 +00:00