Summary: | <www-servers/sniproxy-0.6.1: buffer overflow resulting in arbitrary code execution | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | nemunaire, proxy-maint |
Priority: | Normal | Keywords: | PullRequest |
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731 | ||
See Also: | https://github.com/gentoo/gentoo/pull/30454 | ||
Whiteboard: | ~1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
John Helmert III
2023-04-03 03:46:16 UTC
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=4999c5e769737f642df960bdeff4b00a41740b82 commit 4999c5e769737f642df960bdeff4b00a41740b82 Author: Pierre-Olivier Mercier <nemunaire@nemunai.re> AuthorDate: 2023-04-03 07:30:16 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2023-04-16 06:47:32 +0000 www-servers/sniproxy: Bump to 0.6.1 Bug: https://bugs.gentoo.org/903716 Signed-off-by: Pierre-Olivier Mercier <nemunaire@nemunai.re> Signed-off-by: Sam James <sam@gentoo.org> www-servers/sniproxy/Manifest | 1 + www-servers/sniproxy/sniproxy-0.6.1.ebuild | 75 ++++++++++++++++++++++++++++++ 2 files changed, 76 insertions(+) Thanks! |