tags 493162 patch
thanks
--- libxslt-1.1.24.orig/libexslt/crypto.c
+++ libxslt-1.1.24/libexslt/crypto.c
@@ -595,11 +595,13 @@
int str_len = 0, bin_len = 0, hex_len = 0;
xmlChar *key = NULL, *str = NULL, *padkey = NULL;
xmlChar *bin = NULL, *hex = NULL;
+xsltTransformContextPtr
On Fri, Aug 01, 2008 at 09:11:05AM +0200, Thijs Kinkhorst [EMAIL PROTECTED]
wrote:
tags 493162 patch
thanks
Wouldn't a lot of the strings in this patch be better off allocated
on the stack?
Mike
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
On Friday 1 August 2008 10:09, you wrote:
On Fri, Aug 01, 2008 at 09:11:05AM +0200, Thijs Kinkhorst [EMAIL PROTECTED]
wrote:
tags 493162 patch
thanks
Wouldn't a lot of the strings in this patch be better off allocated
on the stack?
Sorry, I should have made it clearer that I was just
On Fri, Aug 01, 2008 at 10:19:32AM +0200, Thijs Kinkhorst [EMAIL PROTECTED]
wrote:
On Friday 1 August 2008 10:09, you wrote:
On Fri, Aug 01, 2008 at 09:11:05AM +0200, Thijs Kinkhorst [EMAIL
PROTECTED]
wrote:
tags 493162 patch
thanks
Wouldn't a lot of the strings in this patch be
Package: libxslt1.1
Version: 1.1.24-1
Severity: grave
Tags: security
According to DSA 1624-1:
Chris Evans discovered that a buffer overflow in the RC4 functions of
libexslt may lead to the execution of arbitrary code.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
5 matches
Mail list logo