Summary: | media-video/motion <3.2.10.1 HTTP Buffer overflow (CVE-2008-2654) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Pierre-Yves Rofes (RETIRED) <py> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | media-video, releng |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/30544/ | ||
Whiteboard: | B/C1? [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Pierre-Yves Rofes (RETIRED)
![]() patches can be found here: 3.2.9: http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x9/webhttpd-security-video2-backport.diff 3.2.10 http://www.lavrsen.dk/twiki/pub/Motion/ReleaseNoteMotion3x2x10/webhttpd-security.diff media-video, please bump as necessary.btw, the advisory mentions that the HTTP interface needs to be enabled, is it our default setup? 3.2.10.1 added and should be fixed Arches, please test and mark stable: =media-video/motion-3.2.10.1 Target keywords : "amd64 release" amd64 stable, all arches done. GLSA 200807-02 |