Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.

Summary: CVE-2005-3962 Perl integer overflow issue


https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174684





------- Additional Comments From [EMAIL PROTECTED]  2005-12-08 14:12 EST -------
The upstream perl maintainers have combined the above patch #26244 with 
other sprintf improvements to deal with Sys::Syslog security vulnerabilities,
which are also the subject of CVE-2005-3912 ( CVE-2005-3962 has now been 
raised on this specific integer overflow issue ).  It is recommended to 
apply upstream patches 26235 to 26240 inclusive and 26244 to solve these
issues - I've attached the patches sent by Nicholas Clark, the upstream
perl maintainer, to this bug.



-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.

--
Fedora-perl-devel-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/fedora-perl-devel-list

Reply via email to