Summary: | <kde-frameworks/kio-5.32: Information Leak when accessing https when using a malicious PAC file | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Johannes Huber (RETIRED) <johu> |
Component: | Stabilization | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | Flags: | stable-bot:
sanity-check+
|
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://commits.kde.org/kio/f9d0cb47cf94e209f6171ac0e8d774e68156a6e4 | ||
Whiteboard: | A4 [noglsa cve] | ||
Package list: |
=kde-frameworks/kio-5.29.0-r1
|
Runtime testing required: | --- |
Description
Johannes Huber (RETIRED)
2017-02-28 20:29:20 UTC
Patch backported in =kde-frameworks/kio-5.{29,31}.0-r1 https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9b4b314b09abdf8166816004850cf357eb48d904 Dear arches, please stabilize =kde-frameworks/kio-5.29.0-r1. Thanks in advance. *** Bug 610794 has been marked as a duplicate of this bug. *** amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. Cleanup done. GLSA Vote: No |