[EMAIL PROTECTED] (Moritz Mühlenhoff) writes:

> tcpdump in Sarge is affected by another DoS vulnerability;
> CAN-2005-1267. Please see
> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208
> for details, a patch and a demo exploit.

Yes, I sent a patch to the Security Team a few days ago, but didn't get
a reply.  As the security infrastructure is non-functional at the
moment, I have no hope of seeing this resolved soon (given how my
previous request to update tcpdump in woody had been ignored).

Use the unstable version.

-- 
  ,''`.
 : :' :        Romain Francoise <[EMAIL PROTECTED]>
 `. `'         http://people.debian.org/~rfrancoise/
   `-

Reply via email to