CVE-2022-28755: The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths. Please cleanup.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1f7ce21a121e3e07b3410f527028e891c9b8314a commit 1f7ce21a121e3e07b3410f527028e891c9b8314a Author: Ulrich Müller <ulm@gentoo.org> AuthorDate: 2022-08-12 00:38:25 +0000 Commit: Ulrich Müller <ulm@gentoo.org> CommitDate: 2022-08-12 00:38:25 +0000 net-im/zoom: drop 5.10.7.3311 Bug: https://bugs.gentoo.org/864939 Signed-off-by: Ulrich Müller <ulm@gentoo.org> net-im/zoom/Manifest | 1 - net-im/zoom/zoom-5.10.7.3311.ebuild | 185 ------------------------------------ 2 files changed, 186 deletions(-)
Thanks, all done!