Summary: | www-client/opera < 9.23 - arbitrary code execution | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Christian Faulhammer (RETIRED) <fauli> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | jer |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.opera.com/support/search/view/865/ | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Christian Faulhammer (RETIRED)
2007-08-15 13:23:35 UTC
www-client/opera-9.23 is in CVS. My proposal for severity is B2 and I hope security team is not pissed when I cc arches. Please mark stable www-client/opera-9.23, thanks. x86 stable. sparc stable, and unmasked it - otherwise it's no good for anyone! amd64 stable ppc stable, ready for glsa (voting?) merging GLSA with bug 185497. No vote needed, it's A2 (code execution) GLSA 200708-17, combined with bug 185497. Thanks everybody! |