indeed. I have added updated patches to the upstream bug report: https://banu.com/bugzilla/show_bug.cgi?id=110 Those adhere to coding guidelines and also add configure check for the newly used functions (time, rand, srand).
These could go upstream. I need to really understand the problem though (i.e I am not certain that I understand the phenomenon. the bug report does not contain a precise desciption. or I am not able to reproduce.) Thanks for any details! Michael ** Bug watch added: Banu Bugzilla #110 https://banu.com/bugzilla/show_bug.cgi?id=110 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1154502 Title: Multiple open vulnerabilities in tinyproxy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1154502/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
