Summary: | =sys-libs/glibc-2.37: Buffer overflow in sprintf | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: | https://bugs.gentoo.org/show_bug.cgi?id=893440 | ||
Whiteboard: | ?? [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
2023-02-07 04:14:53 UTC
Fixed in patchset 2 This affects only 2.37 and all affected versions are long gone from Gentoo. (In reply to Andreas K. Hüttel from comment #2) > This affects only 2.37 and all affected versions are long gone from Gentoo. What's the fixed version? Ah, fixed with this commit, I guess: commit 3f5305f584de1481159876f4c174aa87cfce1c89 Author: Andreas K. Hüttel <dilfridge@gentoo.org> Date: Wed Feb 8 15:57:16 2023 +0100 sys-libs/glibc: bump 2.37 to patchset 2 Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org> sys-libs/glibc/Manifest | 2 +- sys-libs/glibc/glibc-2.37.ebuild | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) So affected 2.37 was never even keyworded. All done then. 2.37 was both unaffected and affected, but that still doesn't matter much because it was never keyworded. |