Summary: | <net-misc/quagga-0.99.22.4: OSPFD Potential remote code exec (stack based buffer overflow) (CVE-2013-2236) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | pinkbyte |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=981124 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2013-07-04 08:27:10 UTC
This is fixed in 0.99.22.4, working on ebuild now... Ok, 0.99.22.4 is in tree and it is ready for stabilization Arches, please test and mark stable =net-misc/quagga-0.99.22.4 Target keywords: alpha amd64 arm hppa ppc sparc x86 @s390: since you are considered unstable only arch, please drop keywords to ~s390 Stable for HPPA. arm stable amd64 stable S390 is not anymore a stable arch, removing it from the cc list x86 stable alpha stable ppc stable sparc stable GLSA request has been filed. Cleanup please. + 10 Oct 2013; Sergey Popov <pinkbyte@gentoo.org> -quagga-0.99.20.ebuild, + -quagga-0.99.20-r1.ebuild, -quagga-0.99.21.ebuild, + -files/quagga-0.99.21-fix-no-ipv6.patch, -quagga-0.99.22.ebuild, + -quagga-0.99.22.1.ebuild, -files/quagga-link-libcap.patch, + -files/quagga-services.init.2, -files/zebra.init.3: + Security cleanup wrt bug #475706 This issue was resolved and addressed in GLSA 201310-08 at http://security.gentoo.org/glsa/glsa-201310-08.xml by GLSA coordinator Sean Amoss (ackle). |