| Summary: | <sys-apps/busybox-1.24.2: two heap overflow | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | major | CC: | embedded |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://www.openwall.com/lists/oss-security/2016/03/11/16 | ||
| Whiteboard: | A2 [glsa] | ||
| Package list: | Runtime testing required: | --- | |
bumped here: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=596b078da777fa1b066d57366803a13855a0c652 should be fine for stable @arches, please stabilize the following: =sys-apps/busybox-1.24.2 amd64 stable Stable for HPPA PPC64. ppc stable arm stable x86 stable alpha stable sparc stable ia64 stable Removing unstable arches. @maintainer(s), please remove the vulnerable versions. Please cleanup. Added to existing GLSA. This issue was resolved and addressed in GLSA 201612-04 at https://security.gentoo.org/glsa/201612-04 by GLSA coordinator Aaron Bauman (b-man). @maintainer(s), please clean the vulnerable version from the tree: =sys-apps/busybox-1.24.1 tree is clean |
From ${URL} : CVE-2016-2147 / OOB heap write due to integer underflow https://git.busybox.net/busybox/commit/?id=d474ffc68290e0a83651c4432eeabfa62cd51e87 CVE-2016-2148 / heap overflow in OPTION_6RD parsing https://git.busybox.net/busybox/commit/?id=352f79acbd759c14399e39baef21fc4ffe180ac2 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.