CVE-2021-27229: Mumble before 1.3.4 allows remote code execution if a victim navigates to a crafted URL on a server list and clicks on the Open Webpage text. Patch: https://github.com/mumble-voip/mumble/commit/e59ee87abe249f345908c7d568f6879d16bfd648 Please stabilize 1.3.4.
x86 done
amd64 done all arches done
Please cleanup.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e57fddd2171c191705563384a889bbb2b75960ee commit e57fddd2171c191705563384a889bbb2b75960ee Author: Lars Wendler <polynomial-c@gentoo.org> AuthorDate: 2021-02-26 13:26:24 +0000 Commit: Lars Wendler <polynomial-c@gentoo.org> CommitDate: 2021-02-26 16:41:31 +0000 media-sound/mumble: Security cleanup Bug: https://bugs.gentoo.org/770973 Package-Manager: Portage-3.0.15, Repoman-3.0.2 Signed-off-by: Lars Wendler <polynomial-c@gentoo.org> media-sound/mumble/Manifest | 1 - media-sound/mumble/mumble-1.3.3.ebuild | 161 --------------------------------- 2 files changed, 162 deletions(-)
New GLSA request filed.
This issue was resolved and addressed in GLSA 202105-13 at https://security.gentoo.org/glsa/202105-13 by GLSA coordinator Thomas Deutschmann (whissi).