Could someone prepare update for unrar-nonfree to next etch point
release fixing security issues?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: unrar
Version: 1:3.7.2-1
Severity: critical
Tags: security
>From CVE-2007-0855:
"Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and
possibly other products, allows user-assisted remote attackers to execute
arbitrary code via a crafted, password-protected archive."
2 matches
Mail list logo