* Christian Marillat:

>> | Buffer overflow in the CCdecode function in contrib/ntsc-cc.c in the
>> | zvbi-ntsc-cc tool in Zapping VBI Library (ZVBI) before 0.2.25 allows
>> | attackers to cause a denial of service (application crash) and
>> | possibly execute arbitrary code via long data during a reception
>> | error. NOTE: some of these details are obtained from third party
>> | information.
>>
>> <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3121>
>>
>> I don't know what zvbi-ntsc-cc does, so this might not be a security
>> issue after all.  Please investigate.  Thanks!
>
> What to do with this bug report ? CVE is still a canditate after more
> than 2 months.

This doesn't mean anything, as I tried to explain in my June 16
message:

<http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=429221#17>

The correct way to deal with this bug is to check what the vulnerable
code in ZVBI actually does, and based on that, decide whether a
security update for stable is necessary.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to