Bug#493162: libxslt1.1: buffer overflow [CVE-2008-2935]

2008-08-01 Thread Thijs Kinkhorst
tags 493162 patch thanks --- libxslt-1.1.24.orig/libexslt/crypto.c +++ libxslt-1.1.24/libexslt/crypto.c @@ -595,11 +595,13 @@ int str_len = 0, bin_len = 0, hex_len = 0; xmlChar *key = NULL, *str = NULL, *padkey = NULL; xmlChar *bin = NULL, *hex = NULL; +xsltTransformContextPtr

Bug#493162: [xml/sgml-pkgs] Bug#493162: libxslt1.1: buffer overflow [CVE-2008-2935]

2008-08-01 Thread Mike Hommey
On Fri, Aug 01, 2008 at 09:11:05AM +0200, Thijs Kinkhorst [EMAIL PROTECTED] wrote: tags 493162 patch thanks Wouldn't a lot of the strings in this patch be better off allocated on the stack? Mike -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact

Bug#493162: [xml/sgml-pkgs] Bug#493162: libxslt1.1: buffer overflow [CVE-2008-2935]

2008-08-01 Thread Thijs Kinkhorst
On Friday 1 August 2008 10:09, you wrote: On Fri, Aug 01, 2008 at 09:11:05AM +0200, Thijs Kinkhorst [EMAIL PROTECTED] wrote: tags 493162 patch thanks Wouldn't a lot of the strings in this patch be better off allocated on the stack? Sorry, I should have made it clearer that I was just

Bug#493162: [xml/sgml-pkgs] Bug#493162: libxslt1.1: buffer overflow [CVE-2008-2935]

2008-08-01 Thread Mike Hommey
On Fri, Aug 01, 2008 at 10:19:32AM +0200, Thijs Kinkhorst [EMAIL PROTECTED] wrote: On Friday 1 August 2008 10:09, you wrote: On Fri, Aug 01, 2008 at 09:11:05AM +0200, Thijs Kinkhorst [EMAIL PROTECTED] wrote: tags 493162 patch thanks Wouldn't a lot of the strings in this patch be

Bug#493162: libxslt1.1: buffer overflow [CVE-2008-2935]

2008-07-31 Thread brian m. carlson
Package: libxslt1.1 Version: 1.1.24-1 Severity: grave Tags: security According to DSA 1624-1: Chris Evans discovered that a buffer overflow in the RC4 functions of libexslt may lead to the execution of arbitrary code. -- System Information: Debian Release: lenny/sid APT prefers unstable