From ${URL} : Joshua J. Drake of droidsec.org discovered a stack-based buffer overflow flaw in the ADB client code: http://www.droidsec.org/advisories/2014/02/04/two-security-issues-found-in-the-android-sdk-tools.html Connecting to a malicious ADB server could result in arbitrary code execution. A patch is available from the above link. @maintainer(s): since the package has never been marked as stable, we don't need to stabilize it. After the bump, please remove the affected versions from the tree.
*** Bug 524104 has been marked as a duplicate of this bug. ***
I've added android-tools-0_p20130218 to the tree, and it applies the stack overflow patch for this bug: https://github.com/android/platform_system_core/commit/e89e09dd2b9b42184973e3ade291186a2737bced.patch
And I've removed the vulnerable android-tools-0_p20130123 ebuild from the tree.
Thanks for your work. Cleanup was done, package was never stabilized. Closing as noglsa