Package: swi-prolog
Severity: important
Tags: security
Control: found -1 5.10.1-1
Control: found -1 5.10.4-4
Control: fixed -1 6.2.5-1

Hi,
the following vulnerabilities were published for swi-prolog.

CVE-2012-6089[0]:
pl: Possible buffer overrun in patch canonisation code

CVE-2012-6090[1]:
pl: Possible buffer overflows when expanding file-names with long paths

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] http://security-tracker.debian.org/tracker/CVE-2012-6089
[1] http://security-tracker.debian.org/tracker/CVE-2012-6090

The version in experimental (6.2.5) already contains the fix.

Redhat Bugzilla contains the patches based on 5.10.2 but they almost apply
cleanly to the version 5.10.4 (apart file location)[3,4], but please
double-check.

[3]: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6089
[4]: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6090

Note that if you fix this in unstable, only make changes following the freeze
policy for wheezy[5], so that an unblock might be asked to the release
team.

[5]: http://release.debian.org/wheezy/freeze_policy.html

This vulnerability is marked 'low' and 'no-dsa', so there will be DSA
for swi-prolog.

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to