| Summary: | <net-im/zoom-5.11.0.3540: remote code execution via url parsing vulnerability | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | trivial | CC: | dilfridge, mva, ulm |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://explore.zoom.us/en/trust/security/security-bulletin/ | ||
| Whiteboard: | ~2 [noglsa] | ||
| Package list: | Runtime testing required: | --- | |
|
Description
John Helmert III
2022-08-11 20:26:17 UTC
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1f7ce21a121e3e07b3410f527028e891c9b8314a commit 1f7ce21a121e3e07b3410f527028e891c9b8314a Author: Ulrich Müller <ulm@gentoo.org> AuthorDate: 2022-08-12 00:38:25 +0000 Commit: Ulrich Müller <ulm@gentoo.org> CommitDate: 2022-08-12 00:38:25 +0000 net-im/zoom: drop 5.10.7.3311 Bug: https://bugs.gentoo.org/864939 Signed-off-by: Ulrich Müller <ulm@gentoo.org> net-im/zoom/Manifest | 1 - net-im/zoom/zoom-5.10.7.3311.ebuild | 185 ------------------------------------ 2 files changed, 186 deletions(-) Thanks, all done! |