Summary: | net-im/amsn remote DoS vulnerability | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | net-im |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/053912.html | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
2007-04-22 13:47:51 UTC
CC'ing maintainers is there a patch available? SF is too slow for me right now to check fixed versions are: 0.95-r4 and 0.96-r1 Archs: please mark 0.95-r4 stable (or 0.96-r1 if you prefer) amd64 done, stabled both x86 stable Stable for HPPA. -sparc for us, gcc3-built amsn worked but gcc4 triggers some badness inside that craps it out in the usual sparc fashion (SIGBUS - unaligned memory accesses, bad cast, bad pointer foo). ppc stable alpha stable. Sorry about the delay, I was on holidays. This one is ready for GLSA vote. I tend to vote NO. /vote no, client DoS. Changing to full NO and closing. Feel free to reopen if you disagree. |