On 2012-10-01 11:04:30, Tyler Hicks wrote:
I'll be sure to update this bug when they've applied the fix upstream.
Ok, the fix is public:
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revisionrevision=37068
It ended up being more complicated than I initially thought. The
vulnerability
On 2012-09-30 17:47:30, Antonio Terceiro wrote:
Thanks for submitting this. Did you notify upstream of the fact that the
1.9 series is actually affected by this issue?
Yes, right after I filed this bug. After speaking with upstream, they
will be applying a slightly different fix. You probably
Package: ruby1.9.1
Version: 1.9.3.194-1
Severity: grave
Tags: patch security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu quantal ubuntu-patch
Dear Maintainer,
While running some regression tests I discovered that 1.9.3.194-1 is
vulnerable to
Package: xmlrpc-c
Version: 1.16.33-3.1
Severity: grave
Tags: patch security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu quantal ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
* Run the tests
Package: xmlrpc-c
Version: 1.06.27-1
Followup-For: Bug #687672
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu quantal ubuntu-patch
I've also backported the same changes to 1.06.27-1 for our Lucid
xmlrpc-c package. It looks to apply cleanly to the Squeeze package.
Here's the
Package: t1lib
Version: 5.1.2-3
Severity: grave
Tags: patch security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu precise ubuntu-patch
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764
*** /tmp/tmpP7Dzmm
In Ubuntu, the attached patch
On 2011-12-22 12:35:42, Michael Gilbert wrote:
Hi,
Thanks for sending the patch this way.
No problem!
Do you have any idea how this CVE relates to CVE-2011-1552 through
CVE-2011-1554 [0]? According to mitre's description they are all
different vulnerability than CVE-2011-0764, but then
7 matches
Mail list logo