Processing commands for [EMAIL PROTECTED]:

> retitle 478680 [gnome-peercast] CVE-2008-2040 stack-based buffer overflow in 
> HTTP::getAuthUserPass function
Bug#478680: [gnome-peercast] remote stack-based buffer overflow in 
HTTP::getAuthUserPass function
Changed Bug title to `[gnome-peercast] CVE-2008-2040 stack-based buffer 
overflow in HTTP::getAuthUserPass function' from `[gnome-peercast] remote 
stack-based buffer overflow in HTTP::getAuthUserPass function'.

> retitle 478573 [peercast] CVE-2008-2040 stack-based buffer overflow in 
> HTTP::getAuthUserPass function
Bug#478573: [peercast] stack-based buffer overflow in HTTP::getAuthUserPass 
function
Changed Bug title to `[peercast] CVE-2008-2040 stack-based buffer overflow in 
HTTP::getAuthUserPass function' from `[peercast] stack-based buffer overflow in 
HTTP::getAuthUserPass function'.

> thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to