Please do not reply directly to this email. All additional comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233700
Summary: CVE-2007-1614: zzliplib stack-based buffer overflow Product: Fedora Extras Version: fc6 Platform: All OS/Version: Linux Status: NEW Severity: medium Priority: medium Component: zziplib AssignedTo: matthias@rpmforge.net ReportedBy: ville.skytta@iki.fi QAContact: extras-qa@fedoraproject.org CC: fedora-security-list@redhat.com
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1614
"Stack-based buffer overflow in the zzip_open_shared_io function in zzip/file.c in ZZIPlib Library before 0.13.49 allows user-assisted remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long filename."
Please do not reply directly to this email. All additional comments should be made in the comments box of this bug report.
Summary: CVE-2007-1614: zzliplib stack-based buffer overflow
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233700
matthias@rpmforge.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution| |NEXTRELEASE
------- Additional Comments From matthias@rpmforge.net 2007-04-11 17:26 EST ------- Packages of 0.13.49 have been pushed to all current branches on March 26. Sorry for forgetting to update and close this bug report.
security@lists.fedoraproject.org