Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#47647 - [gajim] 0.6.14 important security issue
Attached to Project:
Arch Linux
Opened by Sardelli Tommaso (cippaciong) - Wednesday, 06 January 2016, 13:45 GMT
Last edited by Eric Belanger (Snowman) - Saturday, 09 January 2016, 03:45 GMT
Opened by Sardelli Tommaso (cippaciong) - Wednesday, 06 January 2016, 13:45 GMT
Last edited by Eric Belanger (Snowman) - Saturday, 09 January 2016, 03:45 GMT
|
DetailsHello, Gajim 0.6.14 has been flagged out-of-date on December 28th but has not been updated yet. The problem here is that the new version introduces a fix to a quite serious security issue as described here:
http://gultsch.de/gajim_roster_push_and_message_interception.html |
This task depends upon
Closed by Eric Belanger (Snowman)
Saturday, 09 January 2016, 03:45 GMT
Reason for closing: Fixed
Additional comments about closing: gajim-0.16.5-1
Saturday, 09 January 2016, 03:45 GMT
Reason for closing: Fixed
Additional comments about closing: gajim-0.16.5-1
Comment by Remi Gacogne (rgacogne) -
Wednesday, 06 January 2016, 13:47 GMT
For tracking purpose, this vulnerability is CVE-2015-8688.