Package: apache2
Version: 2.0.54-4
Severity:critical
Tags: security, fixed-upstream
There is a possible remote-exploitable buffer overrun in the Apache2 ssl
implementation. A patch is available.
See
http://issues.apache.org/bugzilla/show_bug.cgi?id=35081
and
http://svn.apache.org/viewcvs?rev=18
Build stops with the fallowing error.
In file included from
Reply-To: Joshua Walden <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Resent-From: Joshua Walden <[EMAIL PROTECTED]>
Resent-To: debian-bugs-dist@lists.debian.org
Resent-CC: Debian SDL maintainers <[EMAIL PROTECTED]>
Resent-Date: Sat, 30 Jul 2005
Hi,
Reply-To: Manoj Srivastava <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Resent-From: Manoj Srivastava <[EMAIL PROTECTED]>
Resent-To: debian-bugs-dist@lists.debian.org
Resent-CC: Mickael Profeta <[EMAIL PROTECTED]>
Resent-Date: Tue, 09 Aug 2005 14:48:09 UTC
Resent-Message-ID: <[EMAIL PROTECTED]>
Resen
Package: php5
Version: all
Severity: critical
Tags: security, fixed-upstream
See
http://www.heise-security.co.uk/news/79145
and
http://rhn.redhat.com/errata/RHSA-2006-0708.html
"
An integer overflow was discovered in the PHP memory handling routines. If
a script can cause memory allocation based
4 matches
Mail list logo