Summary: | net-misc/openssh <4.7 X11 cookie privelege escalation (CVE-2007-4752) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Rajiv Aaron Manglani (RETIRED) <rajiv> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.frsirt.com/english/advisories/2007/3156 | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Rajiv Aaron Manglani (RETIRED)
![]() openssh-4.7_p1 is in the tree now thanks Mike. Arches, please test and mark stable net-misc/openssh-4.7_p1. Target keywords are: "alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc ~sparc-fbsd x86 ~x86-fbsd" x86 done alpha/ia64 stable sparc stable amd64 done Stable for HPPA. ppc stable net-misc/openssh-4.7_p1-r1 stable on ppc64 No supported arches left here, someone please please file a glsa request. Setting A1 (local privilege escalation) because this requires user credentials on the machine. GLSA request filed. mips stable. Since it's not user privilege escalation it's not a 1. GLSA 200711-02 |