Summary: | <net-analyzer/echoping-6.0.2_p434 - Buffer Overflow Vulnerabilities (CVE-2010-5111) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | netmon |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/42619/ | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
2010-12-24 04:42:17 UTC
Looks like [1] which has a patch attached. [1] http://sourceforge.net/tracker/?func=detail&aid=3137686&group_id=4581&atid=104581 @maintainers: ping, patching would be nice. I'm preparing a new ebuild based on an SVN snapshot. Arch teams, please test and mark stable: =net-analyzer/echoping-6.0.2_p434 Targeted stable KEYWORDS : amd64 x86 amd64 stable Builds and runs fine on x86. Please mark stable for x86. x86 stable Thanks for you work. GLSA request filed. CVE number was reassigned - now this is CVE-2010-5111 Confirmation - http://www.openwall.com/lists/oss-security/2013/10/21/9 This issue was resolved and addressed in GLSA 201406-07 at http://security.gentoo.org/glsa/glsa-201406-07.xml by GLSA coordinator Sergey Popov (pinkbyte). |