Summary: | net-analyzer/netwatch-1.3.0.1: _FORTIFY_SOURCE indicates presence of overflow | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Diego Elio Pettenò (RETIRED) <flameeyes> |
Component: | Current packages | Assignee: | Markos Chandras (RETIRED) <hwoarang> |
Status: | RESOLVED DUPLICATE | ||
Severity: | normal | CC: | netmon |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://tinderboxlogs.s3.amazonaws.com/tbhs64.excelsior.flameeyes.eu/net-analyzer%3Anetwatch-1.3.0.1%3A20121107-201922.html | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 259417 |
Description
Diego Elio Pettenò (RETIRED)
![]() *netwatch-1.3.0.1-r1 (05 Oct 2010) 05 Oct 2010; Markos Chandras <hwoarang@gentoo.org> +netwatch-1.3.0.1-r1.ebuild, +files/netwatch-1.3.0.1-fix-fortify.patch: Adjust string size to avoid buffer overflow. Bug #339456 28 Jun 2010; Christian Faulhammer <fauli@gentoo.org> *** This bug has been marked as a duplicate of bug 339456 *** |