Launchpad has imported 2 comments from the remote bug at https://bugs.gentoo.org/show_bug.cgi?id=454570.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2013-01-29T19:02:34+00:00 Hanno Boeck wrote: Three buffer overflows have been fixed with the release of libupnp 1.6.18: http://pupnp.sourceforge.net/ChangeLog This fix is a reaction to research of the security company rapid7 about vulnerable upnp devices. Further infos: http://www.kb.cert.org/vuls/id/922681 Reply at: https://bugs.launchpad.net/ubuntu/+source/libupnp/+bug/1110273/comments/0 ------------------------------------------------------------------------ On 2013-01-30T09:58:56+00:00 Gurligebis wrote: I have bumped libupnp to 1.6.18 - it just needs stabilization. Reply at: https://bugs.launchpad.net/ubuntu/+source/libupnp/+bug/1110273/comments/1 ** Changed in: libupnp (Gentoo Linux) Status: Incomplete => Unknown ** Changed in: libupnp (Gentoo Linux) Importance: Unknown => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1110273 Title: [Security] Vulnerability on UPnP, need an update to libupnp 1.6.18 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libupnp/+bug/1110273/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
