Copied from
ubuntu trusty in
Private PPA for Ubuntu Security Team
by Ubuntu Archive Robot
Changelog
fuseiso (20070708-3+deb7u1ubuntu14.04.1) trusty-security; urgency=medium
* merge from Debian
fuseiso (20070708-3+deb7u1) wheezy-security; urgency=high
* Non-maintainer upload by the Wheezy LTS Team.
* debian/patches (Closes: #779047):
(patches copied from the Squeeze version)
+ CVE-2015-8837
Add 02-prevent-buffer-overflow.patch. Prevent stack-based buffer overflow
when concatenating strings to an absolute path name. Prevention is done
by checking that the result will stay under the maximum path length as given
by the platforms PATH_MAX constant.
+ CVE-2015-8836
Add 03-prevent-integer-overflow.patch. Prevent integer overflow in ZISO
code. Bail out if a ZF block size > 2^17 is to be read.
-- Steve Beattie <email address hidden> Mon, 25 Apr 2016 11:53:20 -0700