Domenico Andreoli wrote:
> > http://www.hardened-php.net/advisory_242005.109.html
> > 
> > Stefan Esser discovered several off-by-one errors in libcurl, a
> > multi-protocol file transfer library, that allows local users to
> > trigger a buffer overflow and cause a denial of service or bypass PHP
> > security restrictions via certain URLs.
> 
> this is a duplicate of #342339.

Umh... I didn't see that bug.

> current sid version, 7.15.1-1 is already fixed. current woody version,
> 7.9.5-1 is not affected either.

Are you sure?  Even though the code is quite different, the buffer
extension part of the patch also applied to the woody package.

> etch and sarge are left. for what regards sarge, i already prepared a
> scurity fix and sent a mail to the security team, you can read it in
> the log of #342339.

Oh, haven't seen it.  Will check.

> curl 7.13.2-2sarge4 is available at http://people.debian.org/~cavok/curl/,
> please give it a glance.

Done.  Will prepare a new upload.

It seems we have never talked about CVE-2005-3185 before.  And even worse,
when I checked I didn't find the offending file in the archive.

Thanks,

        Joey

-- 
The only stupid question is the unasked one.

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to