Summary: | net-analyzer/tcpdump BGP infinite loop vulnerability (CAN-2005-1267) | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Thierry Carrez (RETIRED) <koon> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | minor | CC: | adirab, netmon | ||||
Priority: | High | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Other | ||||||
Whiteboard: | B3 [glsa] | ||||||
Package list: | Runtime testing required: | --- | |||||
Attachments: |
|
Description
Thierry Carrez (RETIRED)
2005-06-07 07:56:24 UTC
Created attachment 60774 [details, diff]
tcpdump-bgp-infinite-loop2.patch
netmon: please bump with patch *** Bug 95578 has been marked as a duplicate of this bug. *** Bumped -r3 with patch. Target KEYWORDS="x86 ppc sparc mips alpha arm hppa ia64 amd64 ppc64" Arches, please test and mark stable stable on amd64 Stable on ppc. Stable on hppa. stable on alpha ia64 arm stable Stable on ppc64. Ready for GLSA vote. I would say YES, perhaps as an update to GLSA 200505-06 ? /me votes yes too An update to 200505-06 sounds good since it already mentions BGP etc. anyways. sent as GLSA 200505-06 update mips: remember to mark stable to benefit from GLSA Stable on mips. |