Processing commands for [EMAIL PROTECTED]:
> tag 201750 - security
Bug#201750: XLOCALEDIR buffer overflow
Tags were: security
Tags removed: security
> severity 201750 important
Bug#201750: XLOCALEDIR buffer overflow
Severity set to `important'.
> tag 201750 + upstream pend
tag 201750 - security
severity 201750 important
tag 201750 + upstream pending
retitle 201750 xlibs: _XlcLocaleDirName() susceptible to buffer overflows
thanks
On Thu, Jul 17, 2003 at 12:21:53PM -0400, Mike Furr wrote:
> Package: xlibs
> Version: 4.2.1-9
> Severity: grave
> Tags: security
>
> The
Processing commands for [EMAIL PROTECTED]:
> tag 201750 - security
Bug#201750: XLOCALEDIR buffer overflow
Tags were: security
Tags removed: security
> severity 201750 important
Bug#201750: XLOCALEDIR buffer overflow
Severity set to `important'.
> tag 201750 + upstream pend
tag 201750 - security
severity 201750 important
tag 201750 + upstream pending
retitle 201750 xlibs: _XlcLocaleDirName() susceptible to buffer overflows
thanks
On Thu, Jul 17, 2003 at 12:21:53PM -0400, Mike Furr wrote:
> Package: xlibs
> Version: 4.2.1-9
> Severity: grave
> Tags: security
>
> The
Package: xlibs
Version: 4.2.1-9
Severity: grave
Tags: security
The bug described in http://www.securityfocusonline.com/bid/7002 exists in
sid's (presumable sarge, but not woody) xfree libs.
ie:
XLOCALEDIR=`perl -e 'printf "x" x 8000'` xclock
yields segv. Not a huge impact, but needs to be fix
Package: xlibs
Version: 4.2.1-9
Severity: grave
Tags: security
The bug described in http://www.securityfocusonline.com/bid/7002 exists in
sid's (presumable sarge, but not woody) xfree libs.
ie:
XLOCALEDIR=`perl -e 'printf "x" x 8000'` xclock
yields segv. Not a huge impact, but needs to be fix
6 matches
Mail list logo