Summary: | dev-libs/openssl : freelist misuse causing a possible use-after-free | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED WORKSFORME | ||
Severity: | normal | CC: | base-system |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1087195 | ||
Whiteboard: | A3 [upstream/ebuild] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-04-15 09:47:53 UTC
seems like consensus is it's a non issue (In reply to SpanKY from comment #1) > seems like consensus is it's a non issue Yeah, not a security threat, but still a very weird way for OpenSSL to handle memory. Still a bug in my book, but one that can follow normal stabilization procedures when upstream does patch it. |