Summary: | net-analyzer/nagios-plugins < 1.4.10-r1 check_snmp buffer overflow (CVE-2007-5623) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tobias Scherbaum (RETIRED) <dertobi123> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | dertobi123, netmon |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/27419/ | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 194178 |
Description
Tobias Scherbaum (RETIRED)
2007-10-18 17:35:21 UTC
netmon please advise and patch as necessary. (In reply to comment #0) > a patch is available upstream but this issue isn't confirmed (yet). > no news yet I included the patch posted to the upstream bugreport to 1.4.10-r1 (plus another fix for #194178). Thanks tobias. Arches, please test and mark stable net-analyzer/nagio-plugins-1.4.10-r1 Target keywords: "~alpha amd64 ~ppc ppc64 sparc x86" x86 stable ppc64 stable sparc stable stable on amd64 GLSA 200711-11. |