lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20030325053114.GA8498@guarana.org>
Date: Tue, 25 Mar 2003 16:31:14 +1100
From: caf@...rana.org
To: Timo Sirainen <tss@....fi>
Subject: Re: Buffer overflows in ircII-based clients
Attached is a set of official-ish patches to the BitchX 1.0c19 release
to cover the mentioned buffer mishandling.
Alternatively, you can upgrade to the latest CVS revision of BitchX.
- caf.
View attachment "1.0c19-evil-server.patch" of type "text/plain" (7290 bytes)