On Fri, Aug 01, 2008 at 10:19:32AM +0200, Thijs Kinkhorst <[EMAIL PROTECTED]>
wrote:
> On Friday 1 August 2008 10:09, you wrote:
> > On Fri, Aug 01, 2008 at 09:11:05AM +0200, Thijs Kinkhorst <[EMAIL
> > PROTECTED]>
> wrote:
> > > tags 493162 patch
> > > thanks
> >
> > Wouldn't a lot of the strin
On Friday 1 August 2008 10:09, you wrote:
> On Fri, Aug 01, 2008 at 09:11:05AM +0200, Thijs Kinkhorst <[EMAIL PROTECTED]>
wrote:
> > tags 493162 patch
> > thanks
>
> Wouldn't a lot of the strings in this patch be better off allocated
> on the stack?
Sorry, I should have made it clearer that I was
On Fri, Aug 01, 2008 at 09:11:05AM +0200, Thijs Kinkhorst <[EMAIL PROTECTED]>
wrote:
> tags 493162 patch
> thanks
Wouldn't a lot of the strings in this patch be better off allocated
on the stack?
Mike
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Co
tags 493162 patch
thanks
--- libxslt-1.1.24.orig/libexslt/crypto.c
+++ libxslt-1.1.24/libexslt/crypto.c
@@ -595,11 +595,13 @@
int str_len = 0, bin_len = 0, hex_len = 0;
xmlChar *key = NULL, *str = NULL, *padkey = NULL;
xmlChar *bin = NULL, *hex = NULL;
+xsltTransformContextPtr tc
Processing commands for [EMAIL PROTECTED]:
> tags 493162 patch
Bug#493162: libxslt1.1: buffer overflow [CVE-2008-2935]
Tags were: security
Tags added: patch
> thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(adminis
Package: libxslt1.1
Version: 1.1.24-1
Severity: grave
Tags: security
According to DSA 1624-1:
Chris Evans discovered that a buffer overflow in the RC4 functions of
libexslt may lead to the execution of arbitrary code.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT
6 matches
Mail list logo