Summary: | app-text/acroread <8.1.2-r3 Javascript input validation vulnerability (CVE-2008-2641) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | printing |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.adobe.com/support/security/bulletins/apsb08-15.html | ||
Whiteboard: | A2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() For Unix: http://www.adobe.com/support/downloads/detail.jsp?ftpID=3992 ... July 17, 2008 – Bulletin updated to include information for Unix version Note that we fixed CVE-2008-0883 via bug 212367 already, so this is only the CVE-2008-2641 flaw. Thanks for telling me that they released an updated version, fixed in acroread-8.1.2-r3 now. Arches, please test and mark stable: =app-text/acroread-8.1.2-r3 Target keywords : "amd64 x86" amd64 stable x86 stable GLSA 200808-10 |