Summary: | <net-misc/connman-1.39: remote code execution CVE-2021-26675 | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Piotr Karbowski (RETIRED) <slashbeast> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED DUPLICATE | ||
Severity: | normal | CC: | bkohler |
Priority: | Normal | Flags: | nattka:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.openwall.com/lists/oss-security/2021/02/08/2 | ||
Whiteboard: | |||
Package list: |
net-misc/connman-1.39-r1 *
|
Runtime testing required: | --- |
Description
Piotr Karbowski (RETIRED)
![]() Unable to check for sanity:
> disallowed package spec (only = allowed): <net-misc/connman-1.39
Thank you for reporting! It's a duplicate though, and for future reference security bugs should have the bug alias set to any CVEs, so it's relatively easily be checked if there's a bug for a CVE or not. Personally, I commonly do something like `bugz search --alias CVE-2021-26675`. *** This bug has been marked as a duplicate of bug 769491 *** |