On Sun, May 25, 2008 at 01:16:26AM +1000, Steffen Joeris wrote:
> > I haven't had time to take a deep look at the issue. Anyways, uploading
> > 1.1.24 in unstable (which was planned) should fix this. Is an update
> > for stable required ? Or is the security team already working on it?
> Thanks for
On Sun, May 25, 2008 at 01:16:26AM +1000, Steffen Joeris wrote:
> Hi Mike
>
> On Sun, 25 May 2008 01:01:52 am Mike Hommey wrote:
> > On Sat, May 24, 2008 at 08:16:05PM +1000, Steffen Joeris wrote:
> > > Package: libxslt1.1
> > > Version: 1.1.23-1
> > > Severity: grave
> > > Tags: security, patch
>
On Saturday 24 May 2008 16:01, Nico Golde wrote:
> > More patches from RH:
> > https://bugzilla.redhat.com/show_bug.cgi?id=446809#c13
>
> Its the same.
Ah ok, didn't have time to check before I left :-)
Thijs
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trou
Hi Mike
On Sun, 25 May 2008 01:01:52 am Mike Hommey wrote:
> On Sat, May 24, 2008 at 08:16:05PM +1000, Steffen Joeris wrote:
> > Package: libxslt1.1
> > Version: 1.1.23-1
> > Severity: grave
> > Tags: security, patch
> > Justification: user security hole
> >
> > Hi
> >
> > The following CVE(0) has
On Saturday 24 May 2008 17:01, Mike Hommey wrote:
> I haven't had time to take a deep look at the issue. Anyways, uploading
> 1.1.24 in unstable (which was planned) should fix this. Is an update
> for stable required ? Or is the security team already working on it?
At the moment no-one from the st
On Sat, May 24, 2008 at 08:16:05PM +1000, Steffen Joeris wrote:
> Package: libxslt1.1
> Version: 1.1.23-1
> Severity: grave
> Tags: security, patch
> Justification: user security hole
>
> Hi
>
> The following CVE(0) has been issued against libxslt.
>
> CVE-2008-1767:
>
> Buffer overflow in patt
Hi Thijs,
* Thijs Kinkhorst <[EMAIL PROTECTED]> [2008-05-24 14:25]:
> On Saturday 24 May 2008 12:16, Steffen Joeris wrote:
> > Upstream patch is attached.
>
> More patches from RH:
> https://bugzilla.redhat.com/show_bug.cgi?id=446809#c13
Its the same.
Cheers
Nico
--
Nico Golde - http://www.ngol
On Saturday 24 May 2008 12:16, Steffen Joeris wrote:
> Upstream patch is attached.
More patches from RH:
https://bugzilla.redhat.com/show_bug.cgi?id=446809#c13
Thijs
pgpHJBdsIgDvg.pgp
Description: PGP signature
Package: libxslt1.1
Version: 1.1.23-1
Severity: grave
Tags: security, patch
Justification: user security hole
Hi
The following CVE(0) has been issued against libxslt.
CVE-2008-1767:
Buffer overflow in pattern.c in libxslt before 1.1.24 allows
context-dependent attackers to cause a denial of ser
9 matches
Mail list logo