" This patch addresses a critical issue with the DIME protocol receiver that may cause the receiver to become unresponsive when a malformed DIME protocol message is received. Download gSOAP 2.8.53 or greater. Or alternatively, patch stdsoap2.c and stdsoap2.cpp function soap_getdimehdr by removing the following line that returns SOAP_OK " I cannot find a CVE for this issue.
x86 stable
amd64 stable. Maintainer(s), please cleanup.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c8c89629974ddf0fd9acee9909891f5e9315414b commit c8c89629974ddf0fd9acee9909891f5e9315414b Author: Lars Wendler <polynomial-c@gentoo.org> AuthorDate: 2018-10-21 12:54:22 +0000 Commit: Lars Wendler <polynomial-c@gentoo.org> CommitDate: 2018-10-21 12:55:45 +0000 net-libs/gsoap: Security cleanup. Bug: https://bugs.gentoo.org/652734 Signed-off-by: Lars Wendler <polynomial-c@gentoo.org> Package-Manager: Portage-2.3.51, Repoman-2.3.11 net-libs/gsoap/Manifest | 1 - .../gsoap/files/gsoap-2.7.40-shared_libs.patch | 146 --------------------- .../gsoap-2.8.51-libressl-2.6-compatibility.patch | 38 ------ net-libs/gsoap/gsoap-2.8.51.ebuild | 85 ------------ 4 files changed, 270 deletions(-)
tree is clean....