Summary: | net-misc/mmsclient-0.0.3-r1: buffer overflows | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Harald van Dijk (RETIRED) <truedfx> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED OBSOLETE | ||
Severity: | trivial | Keywords: | PMASKED |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [maskglsa] (CVE requested) Pending Removal: 2009-12-09 | ||
Package list: | Runtime testing required: | --- |
Description
Harald van Dijk (RETIRED)
2009-03-22 20:47:43 UTC
Thanks for the report. The first thing to do would be to report this upstream. Did you contact them already? No, there is no upstream for mmsclient that I know of. @security, you asked me to bring security issues to folks like you first, but the result is that it's been over a month now for something that I would've otherwise fixed in the tree directly. Could you take a look at this, please? It's in the unstable, tree and it seems, that no one cared to look, sorry. It's public via Bug #284747. mmsclient will be removed. *** This bug has been marked as a duplicate of bug 284747 *** No need to keep this closed. Whiteboard was incorrectly changed by me, so I'm reopening; we need a GLSA as there was a stable version. Sorry for bugspam... |