-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 26 Feb 2008 15:11:40 +0100
Source: gnome-peercast
Binary: gnome-peercast
Architecture: source i386
Version: 0.5.4-1.2
Distribution: unstable
Urgency: high
Maintainer: Takuo KITAME <[EMAIL PROTECTED]>
Changed-By: Nico Golde <[EMAIL PROTECTED]>
Description: 
 gnome-peercast - PeerCast user interface for GNOME includes peercast core
Closes: 466539
Changes: 
 gnome-peercast (0.5.4-1.2) unstable; urgency=high
 .
   * Non-maintainer upload by security team.
   * This update addresses the following security issue:
     - CVE-2007-6454: Use the methods from the String class to copy buffers
       rather than strcpy to fix Heap-based buffer overflow in the handshakeHTTP
       function possibly leading to arbitrary code execution (Closes: #466539).
Files: 
 d7285dac1421fc04ad17c4bb5653dc1c 654 gnome optional 
gnome-peercast_0.5.4-1.2.dsc
 3669875e7941e7c2784c3ca69d08fe06 1929 gnome optional 
gnome-peercast_0.5.4-1.2.diff.gz
 c7f63fcd6c5bb2b5732edd087aa43197 245838 gnome optional 
gnome-peercast_0.5.4-1.2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHxChHHYflSXNkfP8RAtK9AKCBMN2MrJgoWmwtRuzhQ3tkq13G7gCeMK2w
woQNOmtcNO5hmokMgvh86+U=
=qSFp
-----END PGP SIGNATURE-----


Accepted:
gnome-peercast_0.5.4-1.2.diff.gz
  to pool/main/g/gnome-peercast/gnome-peercast_0.5.4-1.2.diff.gz
gnome-peercast_0.5.4-1.2.dsc
  to pool/main/g/gnome-peercast/gnome-peercast_0.5.4-1.2.dsc
gnome-peercast_0.5.4-1.2_i386.deb
  to pool/main/g/gnome-peercast/gnome-peercast_0.5.4-1.2_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to