Summary: | <net-misc/openswan-2.6.39: Buffer overflow (CVE-2013-2053) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | floppym |
Priority: | Normal | Keywords: | PMASKED |
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 483576 | ||
Bug Blocks: |
Description
GLSAMaker/CVETool Bot
2013-08-31 22:10:00 UTC
+*openswan-2.6.39 (01 Sep 2013) + + 01 Sep 2013; Mike Gilbert <floppym@gentoo.org> + +files/openswan-2.6.39-gentoo.patch, +openswan-2.6.39.ebuild: + Version bump. B2 as discussed with Chris on IRC. Arches, please test and mark stable: =net-misc/openswan-2.6.39 Target keywords : "amd64 x86" @ago, you forgot about arches ? ;) amd64 stable x86 stable GLSA drafted and ready for review. @maintainer, please drop vulnerable versions Ping! Maintainer(s), please drop the vulnerable version. I will not be dropping openswan-2.6.38 from the tree for the foreseeable future due to bug 483576. This issue was resolved and addressed in GLSA 201401-09 at http://security.gentoo.org/glsa/glsa-201401-09.xml by GLSA coordinator Sean Amoss (ackle). |