Hi Andrea,
On Sun, November 30, 2008 12:33, Andrea De Iacovo wrote:
> New package ready.
> http://www.firstbit.net/debian
>
>
> Could you or Thijs (I'm ccing him) upload it?
I have changed the urgency to high and uploaded it.
Thank you for your work.
Thijs
--
To UNSUBSCRIBE, email to [EMAIL
New package ready.
http://www.firstbit.net/debian
Could you or Thijs (I'm ccing him) upload it?
Thanks a lot
Cheers.
Andrea
signature.asc
Description: Questa รจ una parte del messaggio firmata digitalmente
Hi Andrea
> > If you fix the vulnerability please also make sure to include the
> > CVE id in your changelog entry.
>
> First of all thank you for reporting this.
>
> Upstream's solution it's not so bad in my opinion. Moreover I think
> using official patch should protect us from future bugs.
Don
> Package: wordpress
> Severity: important
> Tags: security, patch
>
> Hi,
>
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for wordpress.
>
> CVE-2008-5278[0]:
> Cross-site scripting (XSS) vulnerability in the self_link function in
> in the RSS Feed Generator (wp-in
Package: wordpress
Severity: important
Tags: security, patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for wordpress.
CVE-2008-5278[0]:
Cross-site scripting (XSS) vulnerability in the self_link function in
in the RSS Feed Generator (wp-includes/feed.php) for Wor
5 matches
Mail list logo