severity 411294 important thanks Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this is not exploitable over the ISDN network, as the generated CAPI messages cannot reach a size allowing an overflow.
This could only be theoretically exploited if there's a pure CAPI server and even then it's only DoS. So there's no need to treat this as an RC bug. Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]