Summary: | <x11-plugins/pidgin-otr-3.2.1: format string vulnerability (CVE-2012-2369) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Michael Palimaka (kensington) <kensington> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | ale, net-im |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://lists.cypherpunks.ca/pipermail/otr-announce/2012-May/000026.html | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Michael Palimaka (kensington)
2012-05-16 12:40:51 UTC
+*pidgin-otr-3.2.1 (17 May 2012) + + 17 May 2012; Lars Wendler <polynomial-c@gentoo.org> +pidgin-otr-3.2.1.ebuild: + non-maintainer commit: Security bump (bug #416263). + Thanks, Lars. Arches, please test and mark stable: =x11-plugins/pidgin-otr-3.2.1 Target keywords : "amd64 ppc sparc x86" amd64 stable x86 stable ppc done sparc keywords dropped Thanks, folks. GLSA request filed. This issue was resolved and addressed in GLSA 201207-05 at http://security.gentoo.org/glsa/glsa-201207-05.xml by GLSA coordinator Sean Amoss (ackle). |