Summary: | <net-dialup/minicom-2.7.1: Remote code exploit possibility | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | embedded |
Priority: | Normal | Keywords: | STABLEREQ |
Version: | unspecified | Flags: | stable-bot:
sanity-check+
|
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2017/04/18/5 | ||
Whiteboard: | B2 [glsa cve glsa cleanup] | ||
Package list: |
=net-dialup/minicom-2.7.1 alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
|
Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
2017-04-19 08:35:03 UTC
This is a new 2.7.1 available at: https://alioth.debian.org/frs/download.php/latestfile/3/minicom-2.7.1.tar.gz Arches, please stabilize Stable for HPPA. amd64 stable Stable on alpha. x86 stable sparc stable ppc stable ppc64 stable Remaining arches are not part of security supported architectures, please stabilize when you have a chance. New GLSA Request filed. Maintainer(s), please drop the vulnerable version(s). arm stable This issue was resolved and addressed in GLSA 201706-13 at https://security.gentoo.org/glsa/201706-13 by GLSA coordinator Kristian Fiskerstrand (K_F). commit bcaa18957c06935a5b13e654bb619fdfecb70751 Author: Tim Harder <radhermit@gentoo.org> Date: Thu Oct 12 00:40:27 2017 -0500 net-dialup/minicom: stabilize 2.7.1 |