Processing commands for cont...@bugs.debian.org:

> #spip (2.1.1-3squeeze4) stable-security; urgency=low
> #
> #  * Updated security screen to 1.1.3. Prevent cross site scripting on referer
> #    (addresses missing bits of [CVE-2012-2151]), cross site scripting and PHP
> #    injections in internal functions.
> #  Closes: #680118
> #
> limit source spip
Limiting to bugs with field 'source' containing at least one of 'spip'
Limit currently set to 'source':'spip'

> tags 680118 + pending
Bug #680118 [spip] spip: PHP injection fixed in new 2.1.16 upstream release
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
680118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680118
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to