Summary: | media-libs/devil<1.7.7 Multiple buffer overflows (CVE-2008-5262) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | games, mr_bones_ |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/secunia_research/2008-59/ | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 258748 | ||
Bug Blocks: |
Description
Stefan Behte (RETIRED)
2009-01-16 22:48:02 UTC
The upstream patch is off-by-one, as reported by Nico Golde in http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512122 Added devil-1.7.7 to the tree and put in a stablereq bug (bug #258748). *** Bug 258748 has been marked as a duplicate of this bug. *** Arches, please test and mark stable: =media-libs/devil-1.7.7 Target keywords : "amd64 ia64 ppc sparc x86" amd64/x86 stable ia64/sparc stable ppc stable GLSA request filed. GLSA 200903-04, thanks everyone, sorry about the delay. |