Summary: | <www-servers/monkeyd-1.2.2 : "mk_request_header_process()" Signedness Error Buffer Overflow Vulnerability (CVE-2013-3843) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | blueness |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/53697/ | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 471906 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2013-06-05 12:59:53 UTC
Looks like upstream has a solution: http://git.monkey-project.com/?p=monkey;a=commit;h=95d646e5de252bfaa8b68c39d0f48e5d82965d41 The patch is in the tree with monkeyd-1.2.0. (In reply to Anthony Basile from comment #2) > The patch is in the tree with monkeyd-1.2.0. 1.2.1 was released with the fix, so I pulled 1.2.0 and pushed 1.2.1 GLSA request filed This issue was resolved and addressed in GLSA 201309-17 at http://security.gentoo.org/glsa/glsa-201309-17.xml by GLSA coordinator Chris Reffett (creffett). |