Summary: | <net-fs/nfs-utils-1.2.8: rpc.gssd is vulnerable to DNS spoofing (CVE-2013-1923) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | net-fs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=948072 | ||
Whiteboard: | A4 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Upstream patch available at: http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=f9f5450f8f946ffc664397c86d05d27ba0406e21 net-fs/nfs-utils-1.3.0 is released upstream Needs newer sys-apps/keyutils will not build against 1.5.5 but unstable 1.5.9 works stable version includes this fix now (In reply to SpanKY from comment #3) > stable version includes this fix now I do not see 1.28 as stable, was it a typo and you meant 1.29 which is stable? (In reply to Yury German from comment #4) no, both modifications were accurate As per vapier this was fixed in 1.28 Maintainer(s), please drop the vulnerable version(s). New GLSA Request filed. Ping for cleanup (In reply to Kristian Fiskerstrand from comment #7) > Ping for cleanup Double ping. Will wait a few days for timeout. Thank you for cleanup. This issue was resolved and addressed in GLSA 201412-02 at http://security.gentoo.org/glsa/glsa-201412-02.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |