stable
FEDORA-EPEL-2013-0366 created by dwmw2 9 years ago for Fedora EPEL 5

This update fixes a potential buffer overflow in HTTP request generation, which could be triggered by a malicious server generating a large number of cookies or redirecting to a large path or hostname.

This update has been submitted for testing by dwmw2.

9 years ago

This update is currently being pushed to the Fedora EPEL 5 testing updates repository.

9 years ago

This update has been pushed to testing

9 years ago

This update has reached 14 days in testing and can be pushed to stable now if the maintainer wishes

9 years ago

This update has been submitted for stable by dwmw2.

9 years ago

This update is currently being pushed to the Fedora EPEL 5 stable updates repository.

9 years ago

This update has been pushed to stable

9 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
9 years ago
in testing
9 years ago
in stable
9 years ago
BZ#910330 CVE-2012-6128 openconnect: Stack-based buffer overflow when processing certain host names, paths, or cookie lists
0
0
BZ#910333 CVE-2012-6128 openconnect: Stack-based buffer overflow when processing certain host names, paths, or cookie lists [epel-all]
0
0

Automated Test Results