Summary: | sys-kernel/dracut: Privilege escalation vulnerability (CVE-2016-5759) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | GLSAMaker/CVETool Bot <glsamaker> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | critical | CC: | aidecoe, alexander, chutzpah, floppym |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | A1 [ebuild cve] | ||
Package list: | Runtime testing required: | --- |
Description
GLSAMaker/CVETool Bot
2017-11-03 15:41:08 UTC
@Maintainers could you please confirm if we are affected by this CVE? Thank you This is not a vulnerability in dracut. The CVE is about a vulnerability in a script called mkdumprd in SUSE's kdump package. I don't think we have any equivalent script/package in Gentoo. Thank you for the information. |