Package: ht Severity: grave Tags: security, patch Justification: user security hole
Gentoo has reported several security issues in ht: 1. An integer overflow in the ELF segment parsing 2. Some buffer overflows in the PE parser. Fixes: (Please double check) 1: http://cvs.sourceforge.net/viewcvs.py/hte/HT%20Editor/cplus-dem.c?r1=1.1&r2=1.2&diff_format=u http://cvs.sourceforge.net/viewcvs.py/hte/HT%20Editor/htanaly.cc?r1=1.45&r2=1.46&diff_format=u http://cvs.sourceforge.net/viewcvs.py/hte/HT%20Editor/htcoff.cc?r1=1.14&r2=1.15&diff_format=u http://cvs.sourceforge.net/viewcvs.py/hte/HT%20Editor/htelf.cc?r1=1.17&r2=1.18&diff_format=u http://cvs.sourceforge.net/viewcvs.py/hte/HT%20Editor/htpef.cc?r1=1.6&r2=1.7&diff_format=u http://cvs.sourceforge.net/viewcvs.py/hte/HT%20Editor/htpeimp.cc?r1=1.17&r2=1.18&diff_format=u 2: http://cvs.sourceforge.net/viewcvs.py/hte/HT%20Editor/htperes.cc?r1=1.8&r2=1.9&diff_format=u Cheers, Moritz -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]