Summary: | <net-im/prosody-0.11.9: Multiple vulnerabilities (CVE-2021-{32917,32918,32919,32920,32921}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | conikost |
Priority: | Normal | Flags: | nattka:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [glsa+ cve] | ||
Package list: |
net-im/prosody-0.11.9
|
Runtime testing required: | No |
Description
Sam James
![]() ![]() ![]() ![]() The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5a6d44e5859ff7c72680a187c29eb4c68f67240d commit 5a6d44e5859ff7c72680a187c29eb4c68f67240d Author: Conrad Kostecki <conikost@gentoo.org> AuthorDate: 2021-05-13 23:26:34 +0000 Commit: Conrad Kostecki <conikost@gentoo.org> CommitDate: 2021-05-13 23:26:34 +0000 net-im/prosody: bump to version 0.11.9 Bug: https://bugs.gentoo.org/789969 Package-Manager: Portage-3.0.18, Repoman-3.0.3 Signed-off-by: Conrad Kostecki <conikost@gentoo.org> net-im/prosody/Manifest | 1 + net-im/prosody/prosody-0.11.9.ebuild | 102 +++++++++++++++++++++++++++++++++++ 2 files changed, 103 insertions(+) Please stabilize. amd64 stable x86 stable arm done arm64 done all arches done The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=2992fce599930fda0a031eeab572bdcab1fcb7a1 commit 2992fce599930fda0a031eeab572bdcab1fcb7a1 Author: Conrad Kostecki <conikost@gentoo.org> AuthorDate: 2021-05-16 00:56:57 +0000 Commit: Conrad Kostecki <conikost@gentoo.org> CommitDate: 2021-05-16 00:56:57 +0000 net-im/prosody: drop old version Bug: https://bugs.gentoo.org/789969 Package-Manager: Portage-3.0.18, Repoman-3.0.3 Signed-off-by: Conrad Kostecki <conikost@gentoo.org> net-im/prosody/Manifest | 1 - net-im/prosody/prosody-0.11.8.ebuild | 102 ----------------------------------- 2 files changed, 103 deletions(-) Thank you! New GLSA request filed. This issue was resolved and addressed in GLSA 202105-15 at https://security.gentoo.org/glsa/202105-15 by GLSA coordinator Thomas Deutschmann (whissi). |