Re: Bug#334697: QA packages with really high popcon numbers :-)

2006-09-18 Thread Steve Langasek
On Mon, Sep 18, 2006 at 06:38:16PM +0200, Thomas Viehmann wrote: > Junichi Uekawa wrote: > >> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334697 > > This bugreport sounds like a joke, really. > > If the goal isn't to 'not release apt-listbugs with etch', > > this is going to be bad. > How imp

Re: QA packages with really high popcon numbers :-)

2006-09-18 Thread Thomas Viehmann
Junichi Uekawa wrote: >> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334697 > > This bugreport sounds like a joke, really. > If the goal isn't to 'not release apt-listbugs with etch', > this is going to be bad. How important is apt-listbugs for users of stable? I don't think stable would have

Re: Update on orphaned packages with very low popcon numbers

2006-09-18 Thread Nathanael Nerode
Thomas Bushnell BSG wrote: >> manpages-fi: 14 >> manpages-ko: 16 > > Dropping these is really not an option; Debian is committed to > internationalization. Well, I guess core manpages don't change that much, so even if they're very obsolete, they are probably still useful. And they're less ea

Bug#388040: marked as done (qa.debian.org: HTML/Client side script injections (XSS) in "advanced [PTS] subscription" script)

2006-09-18 Thread Debian Bug Tracking System
Your message dated Mon, 18 Sep 2006 13:18:25 +0200 with message-id <[EMAIL PROTECTED]> and subject line Bug#388040: qa.debian.org: HTML/Client side script injections (XSS) in "advanced [PTS] subscription" script has caused the attached Bug report to be marked as done. This means that you claim th

Bug#388040: qa.debian.org: HTML/Client side script injections (XSS) in "advanced [PTS] subscription" script

2006-09-18 Thread Moritz Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Thijs, Thijs Kinkhorst wrote: > I don't think this is in any way an issue, even not with "normal" > severity. in my opinion, it remains a bug for the reasons given below. Personally, I don't really care whether or not it's changed/fixed, though.

Bug#388040: qa.debian.org: HTML/Client side script injections (XSS) in "advanced [PTS] subscription" script

2006-09-18 Thread Thijs Kinkhorst
Hello Moritz, Thanks for your report. > The following URLs demonstrate that it is possible to inject client side > script (such as Javascript) and HTML tags into the HTML form (1) and error > message (2) output generated by the "advanced [PTS] subscription" script. The PTS does not have a secur

Bug#388040: qa.debian.org: HTML/Client side script injections (XSS) in "advanced [PTS] subscription" script

2006-09-18 Thread Moritz Naumann
Package: qa.debian.org Severity: normal The following URLs demonstrate that it is possible to inject client side script (such as Javascript) and HTML tags into the HTML form (1) and error message (2) output generated by the "advanced [PTS] subscription" script. (1) http://packages.qa.debian.org