Summary: | <dev-libs/klibc-1.5.25: Shell command injection via DHCP messages (CVE-2011-1930) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | alexanderyt, kernel-misc, mrueg |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.zytor.com/pipermail/klibc/2011-May/002907.html | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Tim Sammut (RETIRED)
![]() @kernel-misc, can we go ahead with stabilization of dev-libs/klibc-1.5.23 ? Ping? Maintainer timeout, quick test reveals no breakages in stable. Arches, please test and mark stable =dev-libs/klibc-1.5.23 Target keywords: amd64 ppc x86 (In reply to Sergey Popov from comment #3) > Maintainer timeout, quick test reveals no breakages in stable. > > Arches, please test and mark stable =dev-libs/klibc-1.5.23 > > Target keywords: amd64 ppc x86 Speaking for kernel-misc, just stabilize the latest 1.5* version, =dev-libs/klibc-1.5.25 amd64 stable (In reply to Agostino Sarubbo from comment #5) > amd64 stable (In reply to Tim Harder from comment #4) [..] > Speaking for kernel-misc, just stabilize the latest 1.5* version, > =dev-libs/klibc-1.5.25 klibc-1.5.23 went stable, while 1.5.25 was the target. can you please stabilize it also on amd64? x86 done, thanks marked ~ppc Thanks for your work New GLSA request filed @maintainers: please clean affected versions. Affected versions removed. This issue was resolved and addressed in GLSA 201309-21 at http://security.gentoo.org/glsa/glsa-201309-21.xml by GLSA coordinator Chris Reffett (creffett). |