Summary: | <net-libs/pacparser-1.4.0: Memory overwrite vulnerability | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | CONFIRMED --- | ||
Severity: | minor | CC: | amadio |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [glsa?] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 850181 | ||
Bug Blocks: |
Description
Sam James
![]() ![]() ![]() ![]() Note that I've pushed 1.4.2 to the tree today, so it now contains the fix for this problem. Please close this bug after confirming. Thank you. https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=da3bd28696a64f3eb8113f789db8a98df672d423 pacparser-1.4.0 (which already contains the fix) is the oldest version in the tree. Please close this bug. Thank you! Closing this since affected versions of pacparser are long gone from the tree. (In reply to Guilherme Amadio from comment #3) > Closing this since affected versions of pacparser are long gone from the > tree. Please don't close bug owned by security that still have a process to follow, even if that process has a huge backlog. |