Summary: | <www-client/uzbl-2012.05.14: world-readable cookie file (CVE-2012-0843) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | wired |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659379 | ||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() =www-client/uzbl-2011.11.18 should be stabilized, as it fixes this vulnerability (per http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659379#38). Apologies, =www-client/uzbl-2011.11.18 does not contain the patch, however =www-client/uzbl-2012.05.14 does. =www-client/uzbl-2012.05.14 should be stabled instead. Thank you! Better. Package has been in tree over a year, so I see no issue going ahead with a stable. Arches, please test and stabilize: =www-client/uzbl-2012.05.14 Target arches: amd64 x86 amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. Thanks for your work GLSA vote: no cleanup done GLSA vote: no. Closing as [noglsa]. |