| Summary: | app-arch/gzip: Double free or corruption in zcat | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED NEEDINFO | ||
| Severity: | normal | CC: | base-system |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1312905 | ||
| Whiteboard: | A3 [upstream] | ||
| Package list: | Runtime testing required: | --- | |
@maintainers, has this been stablized? Can we send to glsa? Mike Boyle Gentoo Security Padawan Following Red Hat (https://bugzilla.redhat.com/show_bug.cgi?id=1312905#c7): Not enough information to reproduce. Closing as NEED INFO. Please re-open once you or anyone else have more details. |
From ${URL} : Possible double free vulnerability was found in zcat when performing lsinitramfs on initrd which includes Intel microcode. Debian bug: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816154 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.