From ${URL} : CVE-2016-2147 / OOB heap write due to integer underflow https://git.busybox.net/busybox/commit/?id=d474ffc68290e0a83651c4432eeabfa62cd51e87 CVE-2016-2148 / heap overflow in OPTION_6RD parsing https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
bumped here: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=596b078da777fa1b066d57366803a13855a0c652 should be fine for stable
@arches, please stabilize the following: =sys-apps/busybox-1.24.2
amd64 stable
Stable for HPPA PPC64.
ppc stable
arm stable
x86 stable
alpha stable
sparc stable
ia64 stable
Removing unstable arches. @maintainer(s), please remove the vulnerable versions.
Please cleanup.
Added to existing GLSA.
This issue was resolved and addressed in GLSA 201612-04 at https://security.gentoo.org/glsa/201612-04 by GLSA coordinator Aaron Bauman (b-man).
@maintainer(s), please clean the vulnerable version from the tree: =sys-apps/busybox-1.24.1
tree is clean