severity 411294 important
thanks
Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this
is not exploitable over the ISDN network, as the generated CAPI messages
cannot reach a size allowing an overflow.
This could only be theoretically exploited if there's a pure CAPI server
and even then it's only DoS.
So there's no need to treat this as an RC bug.
Cheers,
Moritz
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]