* CVE-2020-14363 Description: "There is an integer overflow and a double free vulnerability in the way LibX11 handles locales. The integer overflow is a necessary precursor to the double free."
amd64 done
arm64 stable
arm done
x86 done
sparc done
ppc64 done
hppa stable
This issue was resolved and addressed in GLSA 202008-18 at https://security.gentoo.org/glsa/202008-18 by GLSA coordinator Sam James (sam_c).
Reopening for stable.
ppc done
s390 stable. Maintainer(s), please cleanup.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=196fb1154ddf535dd1483887b44d610518d86ab1 commit 196fb1154ddf535dd1483887b44d610518d86ab1 Author: Matt Turner <mattst88@gentoo.org> AuthorDate: 2020-09-23 01:07:32 +0000 Commit: Matt Turner <mattst88@gentoo.org> CommitDate: 2020-09-23 01:08:16 +0000 x11-libs/libX11: Drop old versions Bug: https://bugs.gentoo.org/738984 Signed-off-by: Matt Turner <mattst88@gentoo.org> x11-libs/libX11/Manifest | 3 --- x11-libs/libX11/libX11-1.6.10.ebuild | 31 ------------------------------- x11-libs/libX11/libX11-1.6.11.ebuild | 31 ------------------------------- x11-libs/libX11/libX11-1.6.9.ebuild | 31 ------------------------------- 4 files changed, 96 deletions(-)
All done. Thanks all.