Summary: | <sys-libs/libhx-3.5: Heap Overflow Vulnerability (CVE-2010-2947) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | hanno |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://libhx.git.sourceforge.net/git/gitweb.cgi?p=libhx/libhx;a=commitdiff;h=904a46f90dd3f046bfac0b64a5e813d7cd4fca59 | ||
Whiteboard: | B1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
![]() Added 3.5 + patch, archs please go ahead with stabilizing. Reopening. Arches, please test and mark stable: =sys-libs/libhx-3.5 Target keywords : "amd64 ppc x86" amd64 done x86 stable Marked ppc stable. Fixing whiteboard and severity based on CVSS vector of: AV:N/AC:L/Au:N/C:C/I:C/A:C Thanks for the tip, Craig. GLSA request filed. libhx-3.5 is stabilized everywhere it has keywords, and all versions below 3.5 have been dropped. Is there anything else that needs to be done? (In reply to comment #9) > Is there anything else that needs to be done? Hi, Matt. We need to publish a GLSA for this one (and any other open bugs with [glsa] in the whiteboard). Once that happens, we'll close the bug. Can you go ahead and vote that you're not going to do anything? Gladly. >3 years old, marking noglsa. |