Source: uwsgi
Version: 2.0.7-1
Severity: important
Tags: patch security upstream

Hi

There is a stack-based buffer overflow flaw within the
uwsgi_expand_path function, cf.:

https://github.com/unbit/uwsgi/commit/cb4636f7c0af2e97a4eef7a3cdcbd85a71247bfe

http://lists.unbit.it/pipermail/uwsgi/2018-February/008835.html

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to