summaryrefslogtreecommitdiff
path: root/chinese/p5-Encode-HanConvert/files/patch-lib::Encode::HanConvert.pm
diff options
context:
space:
mode:
authorTrevor Johnson <trevor@FreeBSD.org>2003-06-01 08:23:28 +0000
committerTrevor Johnson <trevor@FreeBSD.org>2003-06-01 08:23:28 +0000
commit885cb8d505f8e975af3cc4f9a2c1383a91cd702e (patch)
treeb1c7202cc39a3474991504d3701f3e03b263b46c /chinese/p5-Encode-HanConvert/files/patch-lib::Encode::HanConvert.pm
parentUpdate to 1.2.2. (diff)
security update:
The function gzprintf within zlib, when called with a string longer than Z_PRINTF_BUFZISE (= 4096 bytes), can overflow without giving a warning. zlib-1.1.4 and earlier exhibit this behavior. There are no known exploits of the gzprintf overrun, and only a few programs, including rpm2html and gimp-print, are known to use the gzprintf function. The problem has been fixed by checking the length of the output string within gzprintf. --<URL:http://rhn.redhat.com/errata/RHSA-2003-079.html>
Notes
Notes: svn path=/head/; revision=81876
Diffstat (limited to 'chinese/p5-Encode-HanConvert/files/patch-lib::Encode::HanConvert.pm')
0 files changed, 0 insertions, 0 deletions