Secunia: A vulnerability has been reported in TCPreen, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a boundary error when calling "FD_SET()" within the "SocketAddress::Connect()" method in libsolve/sockprot.cpp. This can be exploited to cause a stack-based buffer overflow in certain configurations by establishing multiple concurrent connections. The vulnerability is reported in versions prior to 1.4.4. Solution: Update to version 1.4.4.
Netmon, please bump.
Bump committed.
Arches, please test and mark stable net-analyzer/tcpreen-1.4.4. Target keywords : "x86"
Created attachment 139320 [details, diff] tcpreen-FD_SETSIZE-197-198.patch
x86 stable, last arch!
Thanks. Vote opened.
I vote NO.
voting NO too, and closing.