Hi Matthew!
>This prompted me to take a quick look at the source. There are multiple
>trivially exploitable buffer overflows in this code. E.g.
>src/cryptopass.c:147-149 [0]:
>
>usernamelen = strlen(argv[1]);
>
>memcpy(username, argv[1], usernamelen);
>
>You could argue this program is o
> On May 26, 2020, at 15:10, Mattia Rizzolo wrote:
>
> * building the package shows this "scary" GCC warning:
> |In file included from /usr/include/string.h:495,
> | from cryptopass.c:19:
> |In function 'strncpy',
> |inlined from 'main' at cryptopass.c:200:9:
> |/usr/includ
Control: owner -1 !
Control: tag -1 moreinfo
On Sun, May 24, 2020 at 02:22:42PM +, Vasyl Gello wrote:
> I am looking for a sponsor for my package "cryptopass"
o/
> * Vcs : https://salsa.debian.org/basilgello-guest/cryptopass
I'm mostly looking at the VCS, but I'm not ignoring t
Package: sponsorship-requests
Severity: normal
Dear mentors,
I am looking for a sponsor for my package "shotwell"
Package name: shotwell
Version : 0.30.10-1
Upstream Author : Jim Nelson
URL : https://wiki.gnome.org/Apps/Shotwell
License : LGPL-2.1
Control: owner -1 james...@debian.org
Le lundi 25 mai 2020 à 14:44:20+0200, Pierre-Elliott Bécue a écrit :
> Dear Nicholas,
>
> Thanks for your work, I'll review it!
>
> A few preliminary remarks:
>
> on salsa's repo for vim-ale, you've created a debian/master branch that
> is merely the same a
5 matches
Mail list logo