Launchpad has imported 2 comments from the remote bug at
https://bugs.gentoo.org/show_bug.cgi?id=454570.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2013-01-29T19:02:34+00:00 Hanno Boeck wrote:

Three buffer overflows have been fixed with the release of libupnp 1.6.18:
http://pupnp.sourceforge.net/ChangeLog

This fix is a reaction to research of the security company rapid7 about
vulnerable upnp devices. Further infos:
http://www.kb.cert.org/vuls/id/922681

Reply at:
https://bugs.launchpad.net/ubuntu/+source/libupnp/+bug/1110273/comments/0

------------------------------------------------------------------------
On 2013-01-30T09:58:56+00:00 Gurligebis wrote:

I have bumped libupnp to 1.6.18 - it just needs stabilization.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/libupnp/+bug/1110273/comments/1


** Changed in: libupnp (Gentoo Linux)
       Status: Incomplete => Unknown

** Changed in: libupnp (Gentoo Linux)
   Importance: Unknown => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1110273

Title:
  [Security] Vulnerability on UPnP, need an update to libupnp 1.6.18

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libupnp/+bug/1110273/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to