FYI I've just heard back from kretch and he's testing a new release,
so we should be able to kick out a new package within the week.
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
I'll take a look at those patches and also see if upstream is at all
interested. (Last resort would be a self-immolating
use-barnowl-instead package.)
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian
package: owl
Version: 2.1.11-2
severity: grave
Tags: security
Justification: cve-2009-0363
zwrite.c and zcrypt.c contain multiple buffer overflows in calls to sprintf
that appear to be remotely exploitable.
Please see the patch to barnowl 1.0.1-4 for a minimal set of changes that we
3 matches
Mail list logo