Your message dated Fri, 9 Mar 2012 18:00:41 +0100
with message-id <20120309170041.ga3...@ngolde.de>
and subject line Re: Bug#661011: backuppc: CVE-2011-5081 cross-site scripting 
via RestoreFile action
has caused the Debian Bug report #661011,
regarding backuppc: CVE-2011-5081 cross-site scripting via RestoreFile action
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
661011: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661011
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: backuppc
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for backuppc.

CVE-2011-5081[0]:
| Cross-site scripting (XSS) vulnerability in RestoreFile.pm in BackupPC
| 3.1.0, 3.2.1, and possibly other earlier versions allows remote
| attackers to inject arbitrary web script or HTML via the share
| parameter in a RestoreFile action to index.cgi.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5081
    http://security-tracker.debian.org/tracker/CVE-2011-5081

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgp7Jc6HjTfsR.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Version: 3.1.0-9.1


--- End Message ---

Reply via email to