Bug#320063: Security: buffer-overrun in apache2-ssl

2005-07-26 Thread debian-bts
Package: apache2 Version: 2.0.54-4 Severity:critical Tags: security, fixed-upstream There is a possible remote-exploitable buffer overrun in the Apache2 ssl implementation. A patch is available. See http://issues.apache.org/bugzilla/show_bug.cgi?id=35081 and http://svn.apache.org/viewcvs?rev=18

Bug#320544: libsdl1.2debian-all: SDL1.2debian-all does not build.

2005-07-29 Thread Debian BTS
Build stops with the fallowing error. In file included from Reply-To: Joshua Walden <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Resent-From: Joshua Walden <[EMAIL PROTECTED]> Resent-To: debian-bugs-dist@lists.debian.org Resent-CC: Debian SDL maintainers <[EMAIL PROTECTED]> Resent-Date: Sat, 30 Jul 2005

Bug#322172: Fails to install

2005-08-09 Thread Debian BTS
Hi, Reply-To: Manoj Srivastava <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Resent-From: Manoj Srivastava <[EMAIL PROTECTED]> Resent-To: debian-bugs-dist@lists.debian.org Resent-CC: Mickael Profeta <[EMAIL PROTECTED]> Resent-Date: Tue, 09 Aug 2005 14:48:09 UTC Resent-Message-ID: <[EMAIL PROTECTED]> Resen

Bug#391586: Security: Possible remote-code execution via integer overflow (CVE-2006-4812)

2006-10-07 Thread debian-bts
Package: php5 Version: all Severity: critical Tags: security, fixed-upstream See http://www.heise-security.co.uk/news/79145 and http://rhn.redhat.com/errata/RHSA-2006-0708.html " An integer overflow was discovered in the PHP memory handling routines. If a script can cause memory allocation based