Package: ctorrent Severity: serious Tags: security patch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for ctorrent. CVE-2009-1759[0]: | Stack-based buffer overflow in the btFiles::BuildFromMI function | (trunk/btfiles.cpp) in Enhanced CTorrent (aka dTorrent) 3.3.2 and | probably earlier, and CTorrent 1.3.4, allows remote attackers to cause | a denial of service (crash) and possibly execute arbitrary code via a | Torrent file containing a long path. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1759 http://security-tracker.debian.net/tracker/CVE-2009-1759 Patch: http://dtorrent.svn.sourceforge.net/viewvc/dtorrent/dtorrent/trunk/btfiles.cpp?r1=296&r2=301&view=patch -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkoX4iQACgkQNxpp46476apQSACfZnMhb5D7ovIaEjkDgY+PmMN9 yqsAoJ+5IkruLzc09YpQg0lWXQ30RGiz =hnC5 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org