Bug 33498 - nspr: Integer overflow in memory allocation (2.4)
Summary: nspr: Integer overflow in memory allocation (2.4)
Status: CLOSED WONTFIX
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 3.1
Hardware: Other Linux
: P3 normal
Target Milestone: UCS 2.4-secX
Assignee: Security maintainers
QA Contact:
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-21 10:43 CET by Moritz Muehlenhoff
Modified: 2019-04-11 19:23 CEST (History)
0 users

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2013-11-21 10:43:17 CET
CVE-2013-5607: Integer overflow in memory allocation
Comment 1 Moritz Muehlenhoff univentionstaff 2014-01-02 07:36:13 CET
The maintenance with bug and security fixes for UCS 2.4-x has ended on the 31st of December 2013. 

Customers still on UCS 2.4-x are encouraged to update to UCS 3.x. Please contact
your partner or Univention for any questions.