Bug#774014: Segfault after testing connectivity

2014-12-28 Thread Scott Talbert
On Sat, 27 Dec 2014, Scott Talbert wrote: of cookies. Increasing the length of the statically allocated buffer for HTTP headers from 1000 to 1 fix the issue (line 385 of web.cpp). Tell me if you want a patch. Thanks! This has been fixed upstream: https://sourceforge.net/p/concordance/bug

Bug#774014: Segfault after testing connectivity

2014-12-27 Thread Scott Talbert
On Sat, 27 Dec 2014, Vincent Bernat wrote: of cookies. Increasing the length of the statically allocated buffer for HTTP headers from 1000 to 1 fix the issue (line 385 of web.cpp). Tell me if you want a patch. Thanks! This has been fixed upstream: https://sourceforge.net/p/concordance/bu

Bug#774014: Segfault after testing connectivity

2014-12-27 Thread Vincent Bernat
Package: python-libconcord Version: 1.1-2 Severity: grave -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi! After testing connectivity, python-libconcord segfaults: *** buffer overflow detected ***: python terminated === Backtrace: = /lib/x86_64-linux-gnu/libc.so.6(+0x7303f)[0x7f0