[Secure-testing-team] Bug#478573: [peercast] stack-based buffer overflow in HTTP::getAuthUserPass function

Nico Golde debian-secure-testing+ml at ngolde.de
Thu May 1 01:41:34 UTC 2008


Hi Steve,
* Steve Langasek <vorlon at debian.org> [2008-05-01 01:35]:
> On Tue, Apr 29, 2008 at 10:22:50PM +0200, Nico Golde wrote:
> > Package: peercast
> > Severity: grave
> > Tags: security
> > X-Debbugs-CC: secure-testing-team at lists.alioth.debian.org
> 
> Hrm, is this really necessary?  I know I'm not actually doing anything on
> secure-testing-team at the moment, but I'm subscribed because I'm interested
> in tracking the status of testing security in aggregate... but if the list
> is going to be used for tracking individual security holes (of which there
> are surely many), it's much less useful to me and I'll probably unsubscribe.

Looks like this was a wishlist bug of reportbug-ng (which I used to report the bug):
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457690

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080501/2c5fcc1f/attachment.pgp 


More information about the Secure-testing-team mailing list