Summary: | <sys-devel/gcc-7.2.0 : multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Andreas K. Hüttel <dilfridge> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | herrtimson, toolchain |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2016/05/05/3 | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=582240 | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Andreas K. Hüttel
![]() ![]() please extend the mask so we can close this (In reply to Andreas K. Hüttel from comment #0) > Split out from bug 582240: > > > > > 5) Various Stack Corruptions (Patch under Review) > > https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 > > https://gcc.gnu.org/ml/gcc-patches/2016-05/threads.html#00105 > > CVE-2016-4491 > Fixed upstream in 7.1 and later Patch: https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=e96d1d8c7877ef25a2ef502b2685ba36b9913fd2 > > > > > 6) Write Access Violation (Patch under Review) > > https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 > > https://gcc.gnu.org/ml/gcc-patches/2016-05/threads.html#00223 > > CVE-2016-4492 > Fixed upstream in 7.1 and later Patch: https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c --- AFAICT, neither of these have the fix in -r1 patchset (https://gitweb.gentoo.org/proj/gcc-patches.git/tree/6.5.0/gentoo). I also checked the git history but nothing seemingly. Never closed - No longer in tree. |