Summary: | <dev-ruby/facter-1.7.6: Arbitrary Code Execution with Required Social Engineering (CVE-2014-{3248,3250}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Matthew Thode ( prometheanfire ) <prometheanfire> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 513322 |
Description
Matthew Thode ( prometheanfire )
![]() ![]() ![]() ![]() the 1.7 series WAS vunlerable (initial CVE said they were not) Arches, please rapid stablize for the following =dev-ruby/facter-1.7.6 amd64 hppa ppc sparc x86 looks like ppc64 is needed for bug 513322 as well Builds fine on x86. Please mark stable for x86. amd64 stable x86 stable how goes the stablereq? ppc stable Stable for HPPA. ppc64 stable sparc stable Arches, Thank you for your work Maintainer(s), please drop the vulnerable version(s). New GLSA Request filed. Vulnerable version has been removed. Maintainer(s), Thank you for cleanup! This issue was resolved and addressed in GLSA 201412-45 at http://security.gentoo.org/glsa/glsa-201412-45.xml by GLSA coordinator Yury German (BlueKnight). |