indeed.
I have added updated patches to the upstream bug report:
https://banu.com/bugzilla/show_bug.cgi?id=110
Those adhere to coding guidelines and also add configure check for
the newly used functions (time, rand, srand).

These could go upstream.
I need to really understand the problem though
(i.e I am not certain that I understand the phenomenon.
the bug report does not contain a precise desciption.
or I am not able to reproduce.)

Thanks for any details!

Michael

** Bug watch added: Banu Bugzilla #110
   https://banu.com/bugzilla/show_bug.cgi?id=110

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1154502

Title:
  Multiple open vulnerabilities in tinyproxy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1154502/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to