Package: gnunet
Severity: serious
Tags: security patch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE-2006-2413: "GNUnet before SVN revision 2781 allows remote attackers
to cause a denial of service (infinite loop and CPU consumption) via an
empty UDP datagram, possibly involving FIONREAD errors."

According to https://gnunet.org/svn/GNUnet/ChangeLog, this issue was
fixed after the release of GNUnet 0.7.0d.  I have set this to serious
because the default answer to the debconf prompt is to start GNUnet at
boot.

A patch may be obtained from svn:

   svn diff -r2780:2781 https://gnunet.org/svn/GNUnet

Please mention the CVE in your changelog.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEbrjrAud/2YgchcQRAjOQAKCIMb7e/Bcsh7T1Hw3mDzpIdR3WpACgs/wB
t7wS26oYSh8z9sZe+SjXpEw=
=Q+eW
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to