[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-10-07 Thread Bug Watch Updater
** Changed in: owl (Debian) Status: New = Fix Released -- CVE-2009-0363: multiple remote buffer overflows https://bugs.launchpad.net/bugs/329165 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-05-23 Thread Alessio Treglia
** Changed in: owl (Ubuntu) Importance: Undecided = Medium ** Changed in: owl (Ubuntu) Status: Confirmed = Fix Released ** Also affects: barnowl (Ubuntu Jaunty) Importance: Undecided Status: New ** Also affects: owl (Ubuntu Jaunty) Importance: Undecided Status: New

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-05-23 Thread Anders Kaseorg
** Changed in: barnowl (Ubuntu Jaunty) Status: New = Fix Released -- CVE-2009-0363: multiple remote buffer overflows https://bugs.launchpad.net/bugs/329165 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-05-20 Thread Anders Kaseorg
This was fixed in Debian in owl 2.2.2-1, and synced into Karmic. I’m not sure about the best way to handle this for Jaunty and before. owl (2.2.2-1) unstable; urgency=low * New upstream release. The upstream author has become active again and has worked with the barnowl developers on

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-03-24 Thread Kees Cook
** Changed in: owl (Ubuntu) Status: New = Confirmed -- CVE-2009-0363: multiple remote buffer overflows https://bugs.launchpad.net/bugs/329165 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-03-09 Thread Steve Langasek
unsubscribing ubuntu-archive in the meantime since there's nothing actionable here; feel free to resubscribe us if a sync is needed. -- CVE-2009-0363: multiple remote buffer overflows https://bugs.launchpad.net/bugs/329165 You received this bug notification because you are a member of Ubuntu

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-03-09 Thread Bug Watch Updater
** Changed in: owl (Debian) Status: Unknown = New -- CVE-2009-0363: multiple remote buffer overflows https://bugs.launchpad.net/bugs/329165 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-03-02 Thread Steve Langasek
This is not a complete sync request for owl. Please provide the information required by https://wiki.ubuntu.com/SyncRequestProcess for this package. ** Changed in: owl (Ubuntu) Status: New = Incomplete -- CVE-2009-0363: multiple remote buffer overflows

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-03-02 Thread Anders Kaseorg
There is currently no fix in Debian that can be synced. Debian is considering several possible resolutions, including potentially removing owl in favor of BarnOwl. I will update this bug when a decision is reached in Debian. ** Changed in: owl (Ubuntu) Status: Incomplete = New --

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-02-23 Thread Anders Kaseorg
Thanks for the barnowl upload. Reopening the owl component. ** Changed in: owl (Ubuntu) Status: Fix Released = New -- CVE-2009-0363: multiple remote buffer overflows https://bugs.launchpad.net/bugs/329165 You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 329165] Re: CVE-2009-0363: multiple remote buffer overflows

2009-02-15 Thread Michael Bienia
Please sync barnowl (1.0.5-1) from Debian unstable (main). barnowl (1.0.5-1) unstable; urgency=high * New upstream release * Fix use of sprintf in zwrite.c and zcrypt.c that is likely to be exploitable * Enable fortify_source and stack protector to reduce impact of similar