Bug 20462
Summary: | Netscape 4.75 buffer overflow | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Daniel Roesen <dr> |
Component: | netscape | Assignee: | Bill Nottingham <notting> |
Status: | CLOSED ERRATA | QA Contact: | David Lawrence <dkl> |
Severity: | medium | Docs Contact: | |
Priority: | high | ||
Version: | 7.0 | CC: | jarno.huuskonen, rgorosito, rvokal |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2000-11-10 17:06:18 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Daniel Roesen
2000-11-07 12:59:22 UTC
I don't see any details of this in the release notes for 4.76. Do you have a pointer to the original vulnerability report?g if you mean a report before FreeBSD's advisory: I'm not aware of any. Yeah, that's what I meant; I was surprised that the FreeBSD advisory came out of the blue with no word from Netscape, or even the original credited vulnerability discoverer. any news yet? 4.76 errata packages were released. |