Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 285011 (CVE-2008-7224) - <www-client/elinks-0.11.5 DoS (CVE-2008-7224)
Summary: <www-client/elinks-0.11.5 DoS (CVE-2008-7224)
Status: RESOLVED FIXED
Alias: CVE-2008-7224
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://bugs.debian.org/cgi-bin/bugrep...
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-09-14 22:22 UTC by Stefan Behte (RETIRED)
Modified: 2009-09-23 20:39 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2009-09-14 22:22:37 UTC
CVE-2008-7224 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-7224):
  Buffer overflow in entity_cache in ELinks before 0.11.4rc0 allows
  remote attackers to cause a denial of service (crash) via a crafted
  link.
Comment 1 Stefan Behte (RETIRED) gentoo-dev Security 2009-09-14 22:23:33 UTC
It seems we just have to remove older ebuilds.
Comment 2 Michal Januszewski (RETIRED) gentoo-dev 2009-09-23 20:33:48 UTC
Please feel free to remove 0.11.3 and 0.11.4 if that is necessary to fix this bug.
Comment 3 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-09-23 20:39:56 UTC
(In reply to comment #2)
> Please feel free to remove 0.11.3 and 0.11.4 if that is necessary to fix this
> bug.
> 

Usually this is the maintainer's task. I did it for you this time, next time we ask you to do it yourself.

Client DoS -> noglsa. Closing.