From ${URL} : It was reported that when Geary, an email client, received a certificate error, it continued connecting without warning the user. This could lead to man-in-the-middle attacks. This has been fixed in upstream version 0.6.3 (this version is in Fedora 20 testing). References: https://bugzilla.gnome.org/show_bug.cgi?id=713247 https://git.gnome.org/browse/geary/commit/?h=geary-0.6&id=55f06a7bdcedb7efde6a516bde626ea28793ca7e @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
+*geary-0.6.3 (16 Sep 2014) + + 16 Sep 2014; Julian Ospald <hasufell@gentoo.org> +geary-0.6.3.ebuild, + +files/geary-0.6.3-cflags.patch: + security version bump wrt #522926 go ahead and stabilize
Arches, please test and mark stable: =mail-client/geary-0.6.3 Target keywords : "amd64 x86"
stabilize geary-0.6.3-r1 now instead
amd64 stable
x86 stable. Maintainer(s), please cleanup. Security, please vote.
GLSA vote: no.
CVE-2014-5444 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5444): Geary before 0.6.3 does not present the user with a warning when a TLS certificate error is detected, which makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
GLSA Vote: No Maintainer(s), please drop the vulnerable version(s).
Maintainer(s), Thank you for you for cleanup.