Summary: | <x11-libs/libXpm-3.5.12: integer overflow | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Matt Turner <mattst88> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | x11 |
Priority: | Normal | Flags: | kensington:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://lists.freedesktop.org/archives/xorg/2016-December/058537.html | ||
Whiteboard: | A3 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Matt Turner
2016-12-15 19:28:46 UTC
Stable on alpha. amd64 stable x86 stable arm stable sparc stable ia64 stable ppc stable ppc64 stable Stable for HPPA. Just waiting on arm64@ Thanks, we don't need to wait for arm64 to proceed. New GLSA request filed. arm64 dropped due to being an unstable arch. Please request stabilization in a new bug which does *not* block this bug. This will impact cleanup later. CVE Assignment: http://seclists.org/oss-sec/2017/q1/190 This issue was resolved and addressed in GLSA 201701-72 at https://security.gentoo.org/glsa/201701-72 by GLSA coordinator Thomas Deutschmann (whissi). Re-opening for cleanup. @ Maintainer(s): Please cleanup and drop <x11-libs/libXpm-3.5.12! Vulnerable versions have now been removed in commit a99914d2265ba3dcb4fa6a4c680ebec84be69083 Author: Matt Turner <mattst88@gentoo.org> Date: Sun Jan 29 09:20:26 2017 -0800 x11-libs/libXpm: Drop vulnerable versions. |