Summary: | <dev-games/irrlicht-1.3.1 libpng tRNS Chunk Denial of Service | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tobias Heinlein (RETIRED) <keytoaster> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | CC: | games |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/27056/ | ||
Whiteboard: | B3 [ebuild] | ||
Package list: | Runtime testing required: | --- |
Description
Tobias Heinlein (RETIRED)
2007-10-04 07:37:06 UTC
Version 1.3.1 is already in the tree. Games, is this version ready to go stable? Or is there a good reason why it isn't stable yet (even 1.3 is in the tree for 4 months now, without any bugs)? Please advise. I don't think we're affected by this because all of the versions in the tree are built without the bundled jpeg, zlib and libpng. i would close it as INVALID, as Tristan says that the gentoo versions don't use the vulnerable code. Furthermore the relevance of that bug is questionable, since we don't handle client-side DoS, and i'm not sure a DoS could be triggered on a server here. Feel free to reopen if you have clue that we're affected and a server using this engine could be remotely crashed. |