Summary: | <net-nds/rpcbind-0.2.3-r1: Use-after-free vulnerability in PMAP_CALLIT (CVE-2015-7236) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | base-system, net-fs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1264345 | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1264345 | ||
Whiteboard: | B3 [glsa cve cleanup+] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() fix is in rpcbind-0.2.3-r1 which may go stable at any time http://gitweb.gentoo.org/repo/gentoo.git/commit/?id=de6d02b6cf69bec8e91b7e7e3b4a083f8b13b822 amd64 stable x86 stable ppc stable sparc stable Stable for HPPA PPC64. arm stable alpha stable ia64 stable. Maintainer(s), please cleanup. Security, please vote. Arches, Thank you for your work. GLSA Vote: Yes New GLSA Request filed. Maintainer(s), please drop the vulnerable version(s). Maintainer(s), please drop the vulnerable version(s). @Maintainer(s), please cleanup. Dependencies check out... may security please clean? Can this not be cleaned for some reason? This issue was resolved and addressed in GLSA 201611-17 at https://security.gentoo.org/glsa/201611-17 by GLSA coordinator Aaron Bauman (b-man). |