Summary: | <net-dns/c-ares-1.13.0: NAPTR parser out of bounds access | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | blueness |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://c-ares.haxx.se/adv_20170620.html | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: |
net-dns/c-ares-1.13.0
|
Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
2017-06-20 07:17:02 UTC
@ Arches, please test and mark stable: =net-dns/c-ares-1.13.0 Stable on amd64. ia64 stable arm stable x86 stable alpha stable sparc was dropped to exp. https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=b5901d8f716555a1479f12313a2925fcadd177a9 ppc64 stable ppc stable hppa stable please clean vulnerable versions. GLSA Vote: No. @blueness, can 1.12.0 be dropped? (In reply to Aaron Bauman from comment #12) > GLSA Vote: No. > > @blueness, can 1.12.0 be dropped? done sparc stable (thanks to Rolf Eike Beer) |