![]() A Buffer Overflow vulnerability exists in zlog 1.2.15 via
zlog_conf_build_with_file in src/zlog/src/conf.c.
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
(cherry picked from commit
|
||
---|---|---|
.. | ||
0001-Fix-stack-buffer-overflow-at-zlog_conf_build_with_file.patch | ||
Config.in | ||
zlog.hash | ||
zlog.mk |