www: 656a48c5: Properly credit the most recent ZDI MSN ...

rlaager at pidgin.im rlaager at pidgin.im
Tue Jun 9 19:40:29 EDT 2009


-----------------------------------------------------------------
Revision: 656a48c5bb296117ed9f62d8653e2537c562fdde
Ancestor: f927332d4bcc727c09afc628c51ceca4dd7d7dfd
Author: rlaager at pidgin.im
Date: 2009-06-09T23:36:11
Branch: im.pidgin.www
URL: http://d.pidgin.im/viewmtn/revision/info/656a48c5bb296117ed9f62d8653e2537c562fdde

Modified files:
        htdocs/news/security/index.php

ChangeLog: 

Properly credit the most recent ZDI MSN vulnerability.

-------------- next part --------------
============================================================
--- htdocs/news/security/index.php	702e970db94bc98fe8fff63e7a4b6c4861f1bd7a
+++ htdocs/news/security/index.php	86047489f21c485554dceb2221cf56068c7fa6cf
@@ -346,7 +346,7 @@ $vulnerabilities = array(
 		"description"  => "The previous fix to <a href=\"/news/security/?id=25\">CVE-2008-2927</a> was deemed incomplete. The size check improperly cast an uint64 to size_t which can cause an integer overflow, rendering the check useless.",
 		"fix"          => "The proper variable type is now used when doing size comparison. Additionally, the malformed message is now properly discarded.",
 		"fixedversion" => "2.5.6",
-		"discoveredby" => "Anonymous (via TippingPoint's Zero Day Initiative)"
+		"discoveredby" => "Loc VALBON (via TippingPoint's Zero Day Initiative)"
 	)
 );
 /*	Template for the unfortunate future


More information about the Commits mailing list