** Attachment added: "patch from debian"
http://launchpadlibrarian.net/36689248/217485.txt
** Summary changed:
- stack smashing detected
+ buffer overflow in parsing routines' from `Aborts when running with -r flag
** Changed in: pgp4pine (Ubuntu)
Status: New => Confirmed
--
buffer
The bug still exists in Karmic. Debian has patch in its bugtracker.
MInd you, this is also a security issue.
I haven't looked into the code for a while but I remember that there
were more overflows than the patch that's provided in the Debian bug
report.
** Changed in: pgp4pine (Ubuntu)
S
This bug is still marked as Incomplete so we are now going to close this
bug report. Please upgrade to the latest release Karmic 9.10 - If this
bug is still reproducible please reopen the bug by setting the status to
New. Thanks
** Changed in: pgp4pine (Ubuntu)
Status: Incomplete => Invalid
Hi,
The Debian bug suggests this is fixed, can anyone reproduce it
on Intrepid or Jaunty?
Thanks,
James
** Changed in: pgp4pine (Ubuntu)
Status: New => Incomplete
--
stack smashing detected
https://bugs.launchpad.net/bugs/217485
You received this bug notification because you are a mem
** Changed in: pgp4pine (Debian)
Status: Unknown => New
--
stack smashing detected
https://bugs.launchpad.net/bugs/217485
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
ht
** Also affects: pgp4pine (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457947
Importance: Unknown
Status: Unknown
--
stack smashing detected
https://bugs.launchpad.net/bugs/217485
You received this bug notification because you are a member of Ubuntu
Bugs, which is su
Same as http://bugs.debian.org/457947. Thus this is not amd64 related.
--
stack smashing detected
https://bugs.launchpad.net/bugs/217485
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubunt