Ola Lundqvist ha scritto:
> Sure. In that case where do I upload it. To lenny-proposed-updates?
stable-proposed-updates for lenny and oldstable-proposed-updates for etch.[1]
Please contact the stable release team before you upload.
[1]http://www.debian.org/doc/developers-reference/pkgs.html#uploa
Hi Mirtz
On Sun, Sep 27, 2009 at 12:40:54PM +0200, Moritz Muehlenhoff wrote:
> On Sun, Sep 27, 2009 at 11:35:46AM +0200, Ola Lundqvist wrote:
> > Hi Giuseppe
> >
> > Thanks a lot for the report. The attached patch should solve
> > this problem.
> >
> > To the security team. Do you want me to upl
On Sun, Sep 27, 2009 at 11:35:46AM +0200, Ola Lundqvist wrote:
> Hi Giuseppe
>
> Thanks a lot for the report. The attached patch should solve
> this problem.
>
> To the security team. Do you want me to upload this to stable in
> addition to unstable?
This doesn't warrant a DSA, but you could pro
Hi Giuseppe
Thanks a lot for the report. The attached patch should solve
this problem.
To the security team. Do you want me to upload this to stable in
addition to unstable?
Please also review if you think this solution is good enough?
// Ola
On Mon, Aug 24, 2009 at 08:46:17AM +0200, Giusepp
Package: ntop
Severity: serious
Tags: security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for ntop.
CVE-2009-2732[0]:
| The checkHTTPpassword function in http.c in ntop 3.3.10 and earlier
| allows remote attackers to
5 matches
Mail list logo