develooper Front page | perl.par | Postings from September 2008

[rt.cpan.org #39233] Suspected buffer overflow while running executable made by Par::Packer

Thread Next
From:
Steffen Mueller via RT
Date:
September 12, 2008 22:39
Subject:
[rt.cpan.org #39233] Suspected buffer overflow while running executable made by Par::Packer
Message ID:
rt-3.6.HEAD-24639-1221255535-46.39233-15-0@rt.cpan.org
Fri Sep 12 17:38:55 2008: Request 39233 was acted upon.
Transaction: Correspondence added by SMUELLER
       Queue: PAR
     Subject: Suspected buffer overflow while running executable made by Par::Packer
   Broken in: (no value)
    Severity: (no value)
       Owner: Nobody
  Requestors: dave_clarke@merck.com
      Status: new
 Ticket <URL: http://rt.cpan.org/Ticket/Display.html?id=39233 >


Unfortunately, I'm unable to reproduce the problem. I could only check
on linux, though.

Would it be possible to provide an entire test script which fails if you
package and run it? I'll try to dig up a working Virtual Machine for
testing on win32.

Best regards,
Steffen

Thread Next


nntp.perl.org: Perl Programming lists via nntp and http.
Comments to Ask Bjørn Hansen at ask@perl.org | Group listing | About