In article <[EMAIL PROTECTED]>, Mark A. Bialik <[EMAIL PROTECTED]> wrote: >Be aware that qpopper has been subject to buffer overflow exploits the >past few days.
And a new qpopper has been in Incoming since Saturday. >Patches were posted, but today a new series of attacks >proved the patches worthless. Not the patch that I wrote and used! I know there still is a small bug in it, but that is NOT exploitable. Mike. -- Miquel van Smoorenburg | Our vision is to speed up time, [EMAIL PROTECTED] | eventually eliminating it. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]