Summary: | <app-admin/puppet-0.25.4-r1: symlink attack (CVE-2010-0156) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | fauli, jesse, luckyluke, matsuu |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=502881 | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 306195 | ||
Bug Blocks: |
Description
Stefan Behte (RETIRED)
2010-03-06 15:17:10 UTC
Please provide an updated ebuild or bump to a fixed version. The awareness for this bug is low, because stabilisation happens in 306195, which does not make it clear that there is a vulnerability to fix. All supported archs are at stable version 0.25.4-r1 in portage, this bug should not affect anyone without explicit portage masking of newer version. The only affected ebuild in portage is 0.24.8-r1, upstream already pushed out 0.24.9 and considers 0.24.x "legacy". GLSA Vote: Yes. Yes, too, GLSA request filed. This issue was resolved and addressed in GLSA 201203-03 at http://security.gentoo.org/glsa/glsa-201203-03.xml by GLSA coordinator Sean Amoss (ackle). |