On Sat, Jun 13, 2009 at 10:43:55PM +0300, Niko Tyni wrote:
> Security team: I'm attaching proposed debdiffs for stable updates.
> Do you agree that this fix is sufficient? Shall I go ahead and upload?
Update: I've got confirmation from upstream that the one line fix should be
fine. Just say the
On Fri, Jun 12, 2009 at 11:16:54PM +0300, Niko Tyni wrote:
> > > > Compress::Raw::Zlib versions before 2.017 contain a buffer overflow in
> > > > inflate(). A badly formed zlib-stream can trigger this buffer overflow
> > > > and cause
> > > > the perl process at least to hang or to crash.
> >
>
On Fri, Jun 12, 2009 at 12:00:11AM +0300, Niko Tyni wrote:
>
> > > Compress::Raw::Zlib versions before 2.017 contain a buffer overflow in
> > > inflate(). A badly formed zlib-stream can trigger this buffer overflow
> > > and cause
> > > the perl process at least to hang or to crash.
>
> > > http
On Thu, Jun 11, 2009 at 12:42:12PM +0300, Niko Tyni wrote:
> On Thu, Jun 11, 2009 at 10:00:08AM +0200, Stefan Fritsch wrote:
> > Package: perl
> > Version: 5.10.0-19
> > Severity: grave
> > Tags: security
> > Justification: user security hole
> > Compress::Raw::Zlib versions before 2.017 contain a
On Thu, Jun 11, 2009 at 10:00:08AM +0200, Stefan Fritsch wrote:
> Package: perl
> Version: 5.10.0-19
> Severity: grave
> Tags: security
> Justification: user security hole
>
> A security vulnverability was found in Compress::Raw::Zlib:
>
> Compress::Raw::Zlib versions before 2.017 contain a buffe
Package: perl
Version: 5.10.0-19
Severity: grave
Tags: security
Justification: user security hole
A security vulnverability was found in Compress::Raw::Zlib:
Compress::Raw::Zlib versions before 2.017 contain a buffer overflow in
inflate(). A badly formed zlib-stream can trigger this buffer overfl
6 matches
Mail list logo