This was fixed in the CVS for the main project. You guys might want
to check that out. :)
Kevin
On Feb 11, 2010, at 9:06 AM, Jeremy T. Bouse wrote:
Could you please try to be any more vague or would it be too much to
ask for information that actually helps identify the problem
with the fix as we're not tracking CVS...
Kevin Johnson wrote:
This was fixed in the CVS for the main project. You guys might
want to
check that out. :)
Kevin
On Feb 11, 2010, at 9:06 AM, Jeremy T. Bouse wrote:
Could you please try to be any more vague or would it be too
much to
ask
to
fix
the problem already which means I have to track it down which is
time I
don't have. I'll mark this bug as wishlist and upstream and when a
release is made it'll be included.
Kevin Johnson wrote:
It just seems that if you wanted to maintain the project within
Debian,
it would make sense
On Feb 11, 2010, at 10:31 AM, Jeremy T. Bouse wrote:
Maintaining packages is a volunteer effort and comes after my 2
paying
jobs.
Join the club :-) I understand it is volunteer and didn't mean to
piss in your wheaties.
I don't have time to go tracking through CVS to figure out a patch
Vladimir,
We will be releasing a new version as soon as possible from the main
project. I am not sure when that will be available, so maybe you
should switch until then.
Kevin
On Feb 11, 2010, at 10:49 AM, Vladimir Stavrinov wrote:
On Thu, Feb 11, 2010 at 09:56:06AM -0500, Jeremy T.
be
able to reach the PHP scripts and see what happened.
Does that sound like a plan? David, could you please change that
and test
that the changes I outline are sufficient?
Since the Debian package is not maintained by me or the project, it
is you choice whether
to do this.
Kevin
Kevin
,
Daniel R.
Let me know what you would like me to do
Kevin
Kevin Johnson GCIA, GCIH, CISSP, CEH
Principal Consultant
Secure Ideas
http://www.secureideas.net
PGP.sig
Description: This is a digitally signed message part
On Jun 7, 2006, at 5:08 AM, David Gil wrote:
severity 370576 minor
thanks
Thanks...
El mar, 06-06-2006 a las 13:01 -0400, Kevin Johnson escribió:
I have to disagree with the Severity of grave. To exploit you need
to have register_globals set to on which has not been the default in
years
I have to disagree with the Severity of grave. To exploit you need
to have register_globals set to on which has not been the default in
years. We have released 1.2.5 which fixes the issue and a number of
other things. It just gets under my skin when researchers find
problems, elevate
9 matches
Mail list logo