See $URL for details. Maintainer(s), please advise if this package uses this package in a way that could trigger these vulnerabilities.
Looks like the dependency is on 0.5.3 on master.
Maintainer, please cleanup potentially vulnerable versions.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=a00881bec58afbe2eba620be35549d52e3d162df commit a00881bec58afbe2eba620be35549d52e3d162df Author: Michael Mair-Keimberger <mmk@levelnine.at> AuthorDate: 2021-02-20 09:37:32 +0000 Commit: Joonas Niilola <juippis@gentoo.org> CommitDate: 2021-02-28 09:03:07 +0000 app-shells/mcfly: security cleanup Package-Manager: Portage-3.0.14, Repoman-3.0.2 Signed-off-by: Michael Mair-Keimberger <mmk@levelnine.at> Bug: https://bugs.gentoo.org/751091 Closes: https://github.com/gentoo/gentoo/pull/19555 Signed-off-by: Joonas Niilola <juippis@gentoo.org> app-shells/mcfly/Manifest | 51 ------------------ app-shells/mcfly/mcfly-0.3.6.ebuild | 96 --------------------------------- app-shells/mcfly/mcfly-0.5.2.ebuild | 104 ------------------------------------ app-shells/mcfly/mcfly-0.5.3.ebuild | 104 ------------------------------------ 4 files changed, 355 deletions(-)
Thank you! All done.