Summary: | <sys-apps/file-5.32: stack based buffer overflow | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Kristian Fiskerstrand (RETIRED) <k_f> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | base-system, flopwiki, polynomial-c |
Priority: | Normal | Flags: | stable-bot:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2017/09/05/3 | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: |
=sys-apps/file-5.32
|
Runtime testing required: | --- |
Description
Kristian Fiskerstrand (RETIRED)
![]() *** Bug 630732 has been marked as a duplicate of this bug. *** Maintainer(s), please advise if you are ready for stabilization or call for stabilization yourself. @maintainer: ping for stabilization decision <base-system hat> @ Arches, please test and mark stable: =sys-apps/file-5.32 </base-system hat> x86 stable ia64 stable hppa stable ppc64 stable ppc stable Stable on alpha. amd64 stable arm stable, tested by Yury German all arches done. Thank you all, @Maintainers please proceed to remove vulnerable versions. Gentoo Security Padawan ChrisADR Old vulnerable ebuilds dropped. This issue was resolved and addressed in GLSA 201710-02 at https://security.gentoo.org/glsa/201710-02 by GLSA coordinator Aaron Bauman (b-man). |