Package: guile;
Reported by: Mike Gran <spk121 <at> yahoo.com>
Date: Mon, 10 Mar 2025 00:58:02 UTC
Severity: normal
Done: Rob Browning <rlb <at> defaultvalue.org>
Bug is archived. No further changes may be made.
View this message in rfc822 format
From: help-debbugs <at> gnu.org (GNU bug Tracking System) To: Rob Browning <rlb <at> defaultvalue.org> Cc: tracker <at> debbugs.gnu.org Subject: bug#76907: closed (Potential buffer overflow in getsockopt) Date: Tue, 18 Mar 2025 19:37:02 +0000
[Message part 1 (text/plain, inline)]
[Message part 2 (message/rfc822, inline)]
From: Mike Gran <spk121 <at> yahoo.com> To: bug-guile <at> gnu.org Subject: Potential buffer overflow in getsockopt Date: Sun, 09 Mar 2025 17:56:52 -0700[Message part 3 (text/plain, inline)][0001-Fixes-potential-buffer-overflow-in-getsockopt.patch (text/x-patch, attachment)]
[Message part 5 (message/rfc822, inline)]
From: Rob Browning <rlb <at> defaultvalue.org> To: Mike Gran <spk121 <at> yahoo.com>, 76907-done <at> debbugs.gnu.org Subject: Re: bug#76907: Potential buffer overflow in getsockopt Date: Tue, 18 Mar 2025 14:36:31 -0500
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.