Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#70051 - [zint] [Security] arbitrary code execution (CVE-2021-27799)
Attached to Project:
Community Packages
Opened by Jonas Witschel (diabonas) - Thursday, 18 March 2021, 10:56 GMT
Last edited by Balló György (City-busz) - Sunday, 30 May 2021, 10:27 GMT
Opened by Jonas Witschel (diabonas) - Thursday, 18 March 2021, 10:56 GMT
Last edited by Balló György (City-busz) - Sunday, 30 May 2021, 10:27 GMT
|
DetailsSummary
======= The package zint is vulnerable to arbitrary code execution via CVE-2021-27799. Guidance ======== Applying commit 7f8c8114f31c09a986597e0ba63a49f96150368a referenced below fixes the issue. References ========== https://security.archlinux.org/AVG-1625 https://sourceforge.net/p/zint/tickets/218/ https://sourceforge.net/p/zint/code/ci/7f8c8114f31c09a986597e0ba63a49f96150368a/ |
This task depends upon
Closed by Balló György (City-busz)
Sunday, 30 May 2021, 10:27 GMT
Reason for closing: Fixed
Additional comments about closing: zint 2.9.1-2
Sunday, 30 May 2021, 10:27 GMT
Reason for closing: Fixed
Additional comments about closing: zint 2.9.1-2