Summary: | <dev-db/pgbouncer-1.5.5: DoS/remote crash: invalid packet order causes lookup of NULL pointer (CVE-2015-4054) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | bug, bugs, pgsql-bugs, proxy-maint, titanofold |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2015/05/21/2 | ||
Whiteboard: | B3 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 600184 | ||
Bug Blocks: |
Description
Agostino Sarubbo
![]() Pgbouncer-1.6.1 fixes CVE-2015-6817 [1] "authentication bypass". [1] - https://security-tracker.debian.org/tracker/CVE-2015-6817 (In reply to Marcin Mirosław from comment #1) > Pgbouncer-1.6.1 fixes CVE-2015-6817 [1] "authentication bypass". > > [1] - https://security-tracker.debian.org/tracker/CVE-2015-6817 That is a different Bug - This one is 2015-4054. It does not look like CVE-2015-6817 was filed. Maintainers is the stable version for this bug CVE-2015-4054 in tree? Any stabilization effort should go into new sec bug 600184. Added to existing GLSA request. This issue was resolved and addressed in GLSA 201701-24 at https://security.gentoo.org/glsa/201701-24 by GLSA coordinator Aaron Bauman (b-man). |