[EMAIL PROTECTED] (Moritz Mühlenhoff) writes: > tcpdump in Sarge is affected by another DoS vulnerability; > CAN-2005-1267. Please see > https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208 > for details, a patch and a demo exploit.
Yes, I sent a patch to the Security Team a few days ago, but didn't get a reply. As the security infrastructure is non-functional at the moment, I have no hope of seeing this resolved soon (given how my previous request to update tcpdump in woody had been ignored). Use the unstable version. -- ,''`. : :' : Romain Francoise <[EMAIL PROTECTED]> `. `' http://people.debian.org/~rfrancoise/ `-