Summary: | net-misc/dhcp buffer overflow | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Wolfram Schlich (RETIRED) <wschlich> |
Component: | GLSA Errors | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://www.us-cert.gov/cas/techalerts/TA04-174A.html | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Wolfram Schlich (RETIRED)
2004-06-23 02:46:21 UTC
Portage only includes 3.0p2 versions. I suppose we'll avoid the affected rc versions and jump directly to the unaffected. Yeah, I know, that's exactly what I said in my first post... I just wanted to "notify" the Gentoo team about a vulnerability in those versions, so that they don't make it into Portage "by accident" or due to some other reason... I only didn't know any better way :o) |