-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2007:069 http://www.mandriva.com/security/ _______________________________________________________________________ Package : inkscape Date : March 22, 2007 Affected: 2007.0 _______________________________________________________________________ Problem Description: Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs. Updated packages have been patched to address this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1463 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.0: 5f11975b5aeae4ea6ff5c96f2e433baa 2007.0/i586/inkscape-0.44-4.1mdv2007.0.i586.rpm 626bb6d54333ee2e86cd13353952b95a 2007.0/SRPMS/inkscape-0.44-4.1mdv2007.0.src.rpm Mandriva Linux 2007.0/X86_64: a42bb3246e026d19031a72b963649917 2007.0/x86_64/inkscape-0.44-4.1mdv2007.0.x86_64.rpm 626bb6d54333ee2e86cd13353952b95a 2007.0/SRPMS/inkscape-0.44-4.1mdv2007.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFGAvh/mqjQ0CJFipgRAkBXAJ9P//JVFp/VO0brN4PcbhH2miPRYgCg8yjJ /7xi6h15N/08cnJOaq9wqyI= =w6Ny -----END PGP SIGNATURE-----