| Summary: | <sys-kernel/openvz-sources-2.6.32.85.20 : DCCP Packets Handling Memory Corruption Vulnerabilities | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | minor | CC: | andreis.vinogradovs, proxy-maint, pva |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://secunia.com/advisories/57573/ | ||
| Whiteboard: | B3 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
Bumped new version, old unstable were dropped. Arches, please test and mark stable: =sys-kernel/openvz-sources-2.6.32.85.2 target KEYWORDS="amd64 x86" amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. Versions <2.6.32.85.20 are cleaned from tree. No glsa for kernel *-sources. Closing as [noglsa]. |
From ${URL} : Description OpenVZ has issued an update for kernel. This fixes multiple vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system. For more information: SA57446 Solution: Update kernel branch RHEL6 to 042stab085.20. Original Advisory: OpenVZ: http://wiki.openvz.org/Download/kernel/rhel6/042stab085.20 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.