CVE-2021-32575 (https://www.hashicorp.com/blog/category/nomad): HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1. Please bump.
Package list is empty or all packages have requested keywords.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1973994f8ee782f1aaff6b62f99a9fd034f32924 commit 1973994f8ee782f1aaff6b62f99a9fd034f32924 Author: William Hubbs <williamh@gentoo.org> AuthorDate: 2021-08-07 19:34:41 +0000 Commit: William Hubbs <williamh@gentoo.org> CommitDate: 2021-08-07 19:35:07 +0000 sys-cluster/nomad: remove vulnerable version Bug: https://bugs.gentoo.org/797664 Package-Manager: Portage-3.0.20, Repoman-3.0.2 Signed-off-by: William Hubbs <williamh@gentoo.org> sys-cluster/nomad/Manifest | 1 - sys-cluster/nomad/nomad-1.0.4.ebuild | 45 ------------------------------------ 2 files changed, 46 deletions(-)
All done, thanks!