Summary: | <net-misc/openvswitch-2.5.0 - MPLS buffer overflow vulnerabilities in Open vSwitch | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Matthew Thode ( prometheanfire ) <prometheanfire> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Matthew Thode ( prometheanfire )
2016-03-16 17:15:14 UTC
As 2.5.0 is in tree, I'd like to do a fast stablereq on that (amd64/x86) and remove all older releases. adding arch sec liaisons for fast stablereq of =net-misc/openvswitch-2.5.0 stable for both. removed bad versions openvswitch-2.3.0.ebuild openvswitch-2.3.1.ebuild openvswitch-2.3.2.ebuild openvswitch-2.4.0.ebuild cleanup done removing arch contacts issue public at http://www.openwall.com/lists/oss-security/2016/03/29/1 @ Security: Waiting for GLSA... This issue was resolved and addressed in GLSA 201701-07 at https://security.gentoo.org/glsa/201701-07 by GLSA coordinator Thomas Deutschmann (whissi). |