Source: uwsgi Version: 2.0.7-1 Severity: important Tags: patch security upstream
Hi There is a stack-based buffer overflow flaw within the uwsgi_expand_path function, cf.: https://github.com/unbit/uwsgi/commit/cb4636f7c0af2e97a4eef7a3cdcbd85a71247bfe http://lists.unbit.it/pipermail/uwsgi/2018-February/008835.html Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team