On Fri, Feb 08, 2019 at 10:40:12PM +0100, Moritz Mühlenhoff wrote:
> On Thu, Feb 08, 2018 at 01:29:07AM +0100, Santiago Vila wrote:
> > forwarded 889838 http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=548
> > thanks
> >
> > Hello Salvatore. Thanks for the report. I've just forwarded it
> > upst
On Thu, Feb 08, 2018 at 01:29:07AM +0100, Santiago Vila wrote:
> forwarded 889838 http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=548
> thanks
>
> Hello Salvatore. Thanks for the report. I've just forwarded it
> upstream as a first step.
SuSE fixed this with the patch linked from
https://bugz
On Thu, Feb 08, 2018 at 01:29:07AM +0100, Santiago Vila wrote:
> forwarded 889838 http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=548
> thanks
>
> Hello Salvatore. Thanks for the report. I've just forwarded it
> upstream as a first step.
Was there any outcome/result?
Cheers,
Moritz
forwarded 889838 http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=548
thanks
Hello Salvatore. Thanks for the report. I've just forwarded it
upstream as a first step.
Source: unzip
Version: 6.0-16
Severity: important
Tags: security upstream
Hi,
the following vulnerability was published for unzip.
CVE-2018-135[0]:
Heap-based buffer overflow in password protected ZIP archives
If you fix the vulnerability please also make sure to include the
CVE (Common Vul
5 matches
Mail list logo