Summary: | <media-sound/mpg123-1.18.1: MP3 Decoding Buffer Overflow Vulnerability | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | sound |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://secunia.com/advisories/56729/ | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-02-04 10:41:47 UTC
> @maintainer(s): since the fixed package is already in the tree, please let
> us know if it is ready for the stabilization or not.
Sure, go ahead.
Arches, please test and mark stable =media-sound/mpg123-1.18.1 Target keywords: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 (In reply to Sergey Popov from comment #2) > Arches, please test and mark stable =media-sound/mpg123-1.18.1 Target keywords: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 Stable for HPPA. amd64 stable x86 stable alpha stable arm stable ia64 stable ppc64 stable ppc stable sparc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches, Thank you for your work Maintainer(s), please drop the vulnerable version. New GLSA Request filed. Cleanup done. This issue was resolved and addressed in GLSA 201502-01 at http://security.gentoo.org/glsa/glsa-201502-01.xml by GLSA coordinator Mikle Kolyada (Zlogene). |