Summary: | <media-sound/mumble-1.3.4: remote code execution if a victim navigates to a crafted URL (CVE-2021-27229) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | polynomial-c |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa+ cve] | ||
Package list: | Runtime testing required: | --- |
Description
John Helmert III
2021-02-16 16:12:41 UTC
x86 done amd64 done all arches done Please cleanup. The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e57fddd2171c191705563384a889bbb2b75960ee commit e57fddd2171c191705563384a889bbb2b75960ee Author: Lars Wendler <polynomial-c@gentoo.org> AuthorDate: 2021-02-26 13:26:24 +0000 Commit: Lars Wendler <polynomial-c@gentoo.org> CommitDate: 2021-02-26 16:41:31 +0000 media-sound/mumble: Security cleanup Bug: https://bugs.gentoo.org/770973 Package-Manager: Portage-3.0.15, Repoman-3.0.2 Signed-off-by: Lars Wendler <polynomial-c@gentoo.org> media-sound/mumble/Manifest | 1 - media-sound/mumble/mumble-1.3.3.ebuild | 161 --------------------------------- 2 files changed, 162 deletions(-) New GLSA request filed. This issue was resolved and addressed in GLSA 202105-13 at https://security.gentoo.org/glsa/202105-13 by GLSA coordinator Thomas Deutschmann (whissi). |