Summary: | <dev-libs/libebml-1.3.3: Use-after-free vulnerability in EblMaster::Read() | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | media-video |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1276332 | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 573696 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2015-10-29 14:33:17 UTC
already fixed in 1.3.3 which is good to go stable I think Arches, please test and mark stable: =dev-libs/libebml-1.3.3 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 sparc x86" amd64 stable x86 stable Stable for HPPA PPC64. Stable on alpha. ppc stable sparc stable arm stable ia64 stable @maintainer(s), please cleanup. Please clean the vulnerable versions. GLSA Vote: No Cleanup PR: https://github.com/gentoo/gentoo/pull/3465 |