Quoting NOKUBI Takatsugu ([EMAIL PROTECTED]):
> > Is it correct understanding from /me that you actually suggest that I:
> >
> > - NMU namazu2 ASAP
> > - do it with 2.0.18
>
> I hope to do for 2.0.17, then I upload 2.0.18-1 with your work.
OK, so let's summarize:
1 I forget about uploading an
Fortunately, I can take time today, so I sent the security fix patch
to Nico Golde.
At Mon, 31 Mar 2008 07:45:34 +0200,
Christian Perrier wrote:
>
> [1 ]
> Quoting NOKUBI Takatsugu ([EMAIL PROTECTED]):
> > Sorry for my late reply. I had got flu in the last week.
> >
> > The CVE issue was alread
Quoting NOKUBI Takatsugu ([EMAIL PROTECTED]):
> Sorry for my late reply. I had got flu in the last week.
>
> The CVE issue was already fixed in 2.0.18, and it has a simple
> workground so I did'nt considered as so serious.
>
> The latest namazu2 package has some other issue so Christian's NMU is
Quoting NOKUBI Takatsugu ([EMAIL PROTECTED]):
> Sorry for my late reply. I had got flu in the last week.
>
> The CVE issue was already fixed in 2.0.18, and it has a simple
> workground so I did'nt considered as so serious.
>
> The latest namazu2 package has some other issue so Christian's NMU is
Sorry for my late reply. I had got flu in the last week.
The CVE issue was already fixed in 2.0.18, and it has a simple
workground so I did'nt considered as so serious.
The latest namazu2 package has some other issue so Christian's NMU is
welcome, go ahead please.
At Wed, 26 Mar 2008 08:36:45 +0
Quoting Nico Golde ([EMAIL PROTECTED]):
> Package: namazu2
> Severity: important
> Tags: security
>
> Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for namazu2.
An l10n NMU is under preparation for unstable. Of course, this is not
related to the security issue,
Package: namazu2
Severity: important
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for namazu2.
CVE-2008-1468[0]:
| Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu
| before 2.0.18 allows remote attackers to inject arbitrary web script
7 matches
Mail list logo