Summary: | net-misc/asterisk: Buffer overflow in CDR's set user | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | alexanderyt, chainsaw |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1439099 | ||
Whiteboard: | ~2 [noglsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Doesn't affect our stable version (11.25.1). I bumped to masked v13.x release (https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ddf1da777ba1363c0c0aea3729a9a519d7da2ddc). All done, repository is clean. |