Summary: | <app-shells/rssh-2.3.4: Commands Filter Security Bypass Vulnerability (CVE-2012-2252) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | opensource, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B4 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2012-11-29 11:23:09 UTC
The bump is on my TODO list for today Bumped. Please proceed with the stabilization Arches, please test and mark stable: =app-shells/rssh-2.3.4 Target keywords : "amd64 ppc x86" Archtested on x86: Everything OK - Compiles with all USE-flags. - Repoman reports no errors. - Successfully set up a restrictive shell and verified that it worked as I intended it to. amd64 stable ppc stable x86 done, Thanks Dan Dexter for testing! Last arch! Thanks, everyone. GLSA vote: no. GLSA Vote: no too, closing noglsa. Reopening as it has been added to GLSA draft This issue was resolved and addressed in GLSA 201311-19 at http://security.gentoo.org/glsa/glsa-201311-19.xml by GLSA coordinator Sergey Popov (pinkbyte). |