diff options
author | Trevor Johnson <trevor@FreeBSD.org> | 2003-06-01 08:23:28 +0000 |
---|---|---|
committer | Trevor Johnson <trevor@FreeBSD.org> | 2003-06-01 08:23:28 +0000 |
commit | 885cb8d505f8e975af3cc4f9a2c1383a91cd702e (patch) | |
tree | b1c7202cc39a3474991504d3701f3e03b263b46c /chinese/p5-Encode-HanConvert/files/patch-lib::Encode::HanConvert.pm | |
parent | Update to 1.2.2. (diff) |
security update:
The function gzprintf within zlib, when called with a string
longer than Z_PRINTF_BUFZISE (= 4096 bytes), can overflow
without giving a warning. zlib-1.1.4 and earlier exhibit
this behavior. There are no known exploits of the gzprintf
overrun, and only a few programs, including rpm2html and
gimp-print, are known to use the gzprintf function. The
problem has been fixed by checking the length of the output
string within gzprintf.
--<URL:http://rhn.redhat.com/errata/RHSA-2003-079.html>
Notes
Notes:
svn path=/head/; revision=81876
Diffstat (limited to 'chinese/p5-Encode-HanConvert/files/patch-lib::Encode::HanConvert.pm')
0 files changed, 0 insertions, 0 deletions