From ${URL} : A stack-based buffer overflow vulnerability was found in getpwnam()/getgrnam() functions of NSS module nss-mymachines provided by systemd. Upstream patch: https://github.com/keszybz/systemd/commit/cb31827d62066a04b02111df3052949fda4b6888 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
The commit after merging: https://github.com/systemd/systemd/commit/cb31827d62066a04b02111df3052949fda4b6888
The affected code was introduced in systemd-223, so this does not affect the current stable version (systemd-218-r5).
Fixed in 226-r2 and 228-r2 and old ebuilds removed. https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7f59a94c88c938260171d6b5327ea8ae79a032c1 https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=064a64bc25f11be6a38b8b491aa77324f732bd99
(In reply to Mike Gilbert from comment #3) > Fixed in 226-r2 and 228-r2 and old ebuilds removed. Sorry, that should say 228-r1.