Summary: | sys-libs/libsafe: Safety Check Bypass Vulnerability | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Luke Macken (RETIRED) <lewk> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED WONTFIX | ||
Severity: | trivial | CC: | adirab, matsuu |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://www.securityfocus.com/archive/1/395999 | ||
Whiteboard: | ~4 [upstream+] jaervosz | ||
Package list: | Runtime testing required: | --- |
Description
Luke Macken (RETIRED)
2005-04-15 20:22:59 UTC
matsuu, please advise. I don't know the influence by the deletion of the code. Maybe we should wait for upstream reaction on this... *** Bug 90552 has been marked as a duplicate of this bug. *** Any upstream solution yet? It's quite unmaintained in fact... If this is unmaintained and not stable on any arches, I propose to package.mask it. Maybe this should be closed as WONTFIX/UPSTREAM, nobody is worse off using libsafe. I agree with Tavis. Even if this was confirmed and verified, users are still better off using libsafe than not using it. It's unmaintained and ~ anyway, so it will die of it's own death. Reopen if you disagree. |