severity 406400 important
thanks
On Thu, Jan 11, 2007 at 08:29:17PM +0100, Cyril Brulebois wrote:
> Sure. Here is a little cut & paste from #alientrap/irc.irule.net:
> As a member of the Debian Games Team, I'd like to get some
>precisions about CVE-2006-6610
> ok
> It is stated about "
Processing commands for [EMAIL PROTECTED]:
> severity 406400 important
Bug#406400: nexuiz: Open security fixes in Etch
Severity set to `important' from `grave'
> thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrato
Moritz Muehlenhoff <[EMAIL PROTECTED]> (11/01/2007):
> Security databases typically don't investigate very much; they only
> provide a quick write-up. Can you please contact upstream?
Sure. Here is a little cut & paste from #alientrap/irc.irule.net:
As a member of the Debian Games Team, I'd like
On Thu, Jan 11, 2007 at 05:35:25AM +0100, Cyril Brulebois wrote:
> Moritz Muehlenhoff <[EMAIL PROTECTED]> (10/01/2007):
> > I'm currently busy and hadn't had the time to investigate it myself
> > yet, but it should be tracked for Etch:
> > - fixed fake players DoS (CVE-2006-6609)
> > - fixed clie
Moritz Muehlenhoff <[EMAIL PROTECTED]> (10/01/2007):
> I'm currently busy and hadn't had the time to investigate it myself
> yet, but it should be tracked for Etch:
> - fixed fake players DoS (CVE-2006-6609)
> - fixed clientcommands remote console command injection (CVE-2006-6610)
>
> If the sec
Package: nexuiz
Version: 2.1-1
Severity: grave
Tags: security
Justification: user security hole
I'm currently busy and hadn't had the time to investigate it myself yet,
but it should be tracked for Etch:
Nexuiz 2.2.1 fixed two vulnerabilities:
http://sourceforge.net/project/shownotes.php?release_
6 matches
Mail list logo