Summary: | <net-wireless/bluez-5.42: Buffer overflow in parse_line function | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | CC: | pacho |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1425117 | ||
Whiteboard: | B2 [cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2017-02-23 16:20:25 UTC
per https://bugzilla.redhat.com/show_bug.cgi?id=1425117 5.43 version shouldn't be affected git tag --contains 8514068150759c1d6a46d4605d2351babfde1601 | sort -u
5.42
5.43
5.44
>=v5.42 in repository since https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=4a287d008b4feb1268d81a6d8f94de05d225a61e
Repository is clean.
Closing as invalid because Gentoo is not affected by the reported vulnerability.
|