www: 656a48c5: Properly credit the most recent ZDI MSN ...
rlaager at pidgin.im
rlaager at pidgin.im
Tue Jun 9 19:40:29 EDT 2009
-----------------------------------------------------------------
Revision: 656a48c5bb296117ed9f62d8653e2537c562fdde
Ancestor: f927332d4bcc727c09afc628c51ceca4dd7d7dfd
Author: rlaager at pidgin.im
Date: 2009-06-09T23:36:11
Branch: im.pidgin.www
URL: http://d.pidgin.im/viewmtn/revision/info/656a48c5bb296117ed9f62d8653e2537c562fdde
Modified files:
htdocs/news/security/index.php
ChangeLog:
Properly credit the most recent ZDI MSN vulnerability.
-------------- next part --------------
============================================================
--- htdocs/news/security/index.php 702e970db94bc98fe8fff63e7a4b6c4861f1bd7a
+++ htdocs/news/security/index.php 86047489f21c485554dceb2221cf56068c7fa6cf
@@ -346,7 +346,7 @@ $vulnerabilities = array(
"description" => "The previous fix to <a href=\"/news/security/?id=25\">CVE-2008-2927</a> was deemed incomplete. The size check improperly cast an uint64 to size_t which can cause an integer overflow, rendering the check useless.",
"fix" => "The proper variable type is now used when doing size comparison. Additionally, the malformed message is now properly discarded.",
"fixedversion" => "2.5.6",
- "discoveredby" => "Anonymous (via TippingPoint's Zero Day Initiative)"
+ "discoveredby" => "Loc VALBON (via TippingPoint's Zero Day Initiative)"
)
);
/* Template for the unfortunate future
More information about the Commits
mailing list