From ${URL} : An unspecified buffer overflow flaw was found in Remind, a calendar and alarm program: http://lists.roaringpenguin.com/pipermail/remind-fans/2015/003172.html This issue was fixed upstream in the 3.1.15 version of remind. CVE request: http://seclists.org/oss-sec/2015/q3/232 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CHANGES TO REMIND * Version 3.1 Patch 15 - 2015-07-27 - BUG FIX: Fix a buffer overflow found by Alexander Keller - BUG FIX: Fix a typo in this file: was 2014 instead of 2015. - BUG FIX: Make parser reject an AT followed by more than one time. - BUG FIX: Make parser reject epeated delta or *repeat values.
Arch teams, please test and mark stable: =app-misc/remind-03.01.15 Targeted stable KEYWORDS : amd64 ppc x86
amd64 stable
x86 stable
ppc stable. Maintainer(s), please cleanup. Security, please vote.
GLSA Vote: No
Vote: no.