Bug#610960: CVE-2010-4267: Buffer overflow - target squeeze

2011-01-26 Thread Mark Purcell
+hplip (3.10.6-2) unstable; urgency=high + + * SECURITY UPDATE: denial of service and possible arbitrary code +execution via long SNMP response - Thanks Till +- debian/patches/CVE-2010-4267.dpatch: validate dLen in io/hpmud/pml.c. +- Fixes "CVE-2010-4267: Buffer overflow" (Closes: #610

Processed: Re: Bug#610960: CVE-2010-4267: Buffer overflow

2011-01-24 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > user release.debian@packages.debian.org Setting user to release.debian@packages.debian.org (was a...@adam-barratt.org.uk). > usertag 610960 + squeeze-can-defer Bug#610960: CVE-2010-4267: Buffer overflow There were no userta

Bug#610960: CVE-2010-4267: Buffer overflow

2011-01-24 Thread Adam D. Barratt
user release.debian@packages.debian.org usertag 610960 + squeeze-can-defer tag 610960 + squeeze-ignore thanks On Mon, 2011-01-24 at 13:32 +0100, Moritz Muehlenhoff wrote: > please see https://bugzilla.redhat.com/show_bug.cgi?id=662740 for > the description and a patch by Sebastian Krahmer. >

Bug#610960: CVE-2010-4267: Buffer overflow

2011-01-24 Thread Moritz Muehlenhoff
Package: hplip Severity: grave Tags: security Hi, please see https://bugzilla.redhat.com/show_bug.cgi?id=662740 for the description and a patch by Sebastian Krahmer. A DSA is in preparation, for Squeeze please upload the isolated security fix with urgency=high and ask for an unblock on debian-rel