Package: bird Version: 1.0.4-8 Severity: normal Hello,
BIRD has some buffer overflows in its handling of command line arguments. The overflow doesn't seem to have any security impact. They just cause crashes, which is bad enough. Here's a session capture showing one of the bugs in action: $ birdc -s `perl -e 'print "J" x 307;'` Segmentation fault -- Juan Alvarez Fluidsignal Group S.A. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]