Hi,
* Irene Vatton <irene.vat...@inria.fr> [2008-12-23 17:46]:
> Le mardi 23 décembre 2008 à 16:29 +0100, Nico Golde a écrit :
> > CCed upstream.
> > 
> > I am not sure if it is enough to just fix this CVE id.
> > Browsing a bit in the code reveals quite a lot of additional 
> > buffer overflows.
> 
> The new release 11.0.1 published today fixes several buffer overflows.
> Your new reported overflow should be fixed in that release.

How did you fix this? The function of the issue I reported 
still has the same code. Did you fix this without using 
snprintf??

> Nevertheless we plan to make a new corrective release end of January.

Steve, can you assign a CVE id to the issue I reported so we 
can track this issue as well?

Reference should be: 
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507587#15

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpGPnbuOKsnb.pgp
Description: PGP signature

Reply via email to