PHP... used for security advisories...  really? 

Mark

--
Member, OpenBSD foundation  



On Mar 3, 2015, at 12:08 PM, Thorsten Alteholz <[email protected]> wrote:

> Signed PGP part
> Package        : unace
> Version        : 1.2b-7+deb6u1
> CVE ID         : CVE-2015-2063
> Debian Bug     : 775003
> 
> Jakub Wilk discovered that unace, an utility to extract, test and view
> .ace archives, contained an integer overflow leading to a buffer
> overflow. If a user or automated system were tricked into processing a
> specially crafted ace archive, an attacker could cause a denial of
> service (application crash) or, possibly, execute arbitrary code.
> 
> 
> 
> -- 
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact [email protected]
> Archive: 
> https://lists.debian.org/[email protected]
> 
> 

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

Reply via email to