Summary: | net-analyzer/tcpreen < 1.4.4 FD_SET Buffer Overflow Vulnerability (CVE-2007-6562) | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Tobias Heinlein (RETIRED) <keytoaster> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | minor | CC: | netmon | ||||
Priority: | High | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://secunia.com/advisories/28217/ | ||||||
Whiteboard: | B3 [noglsa] | ||||||
Package list: | Runtime testing required: | --- | |||||
Attachments: |
|
Description
Tobias Heinlein (RETIRED)
2007-12-25 20:51:24 UTC
Netmon, please bump. Bump committed. Arches, please test and mark stable net-analyzer/tcpreen-1.4.4. Target keywords : "x86" Created attachment 139320 [details, diff]
tcpreen-FD_SETSIZE-197-198.patch
x86 stable, last arch! Thanks. Vote opened. I vote NO. voting NO too, and closing. |