Am Samstag, 29. November 2008 schrieb Stefan Fritsch:
> > New 0.2.0 packages containing the security patch will be available
> > today.
>
> What is the status here? If you just lack a sponsor, just ask me or any
> other security team member.
>
> Cheers,
> Stefan
Hi,
Nico Golde has done the fix a
New 0.2.0 packages containing the security patch will be available
today.
What is the status here? If you just lack a sponsor, just ask me or any
other security team member.
Cheers,
Stefan
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMA
Am Sonntag, 23. November 2008 schrieb Moritz Muehlenhoff:
> On Sat, Nov 22, 2008 at 03:13:43PM +0100, Eckhart Wörner wrote:
> > Package: quassel
> > Severity: grave
> > Tags: security
> > Justification: user security hole
> >
> > Quassel version in Debian is vulnerable to IRC command injection as
>
On Sat, Nov 22, 2008 at 03:13:43PM +0100, Eckhart Wörner wrote:
> Package: quassel
> Severity: grave
> Tags: security
> Justification: user security hole
>
> Quassel version in Debian is vulnerable to IRC command injection as described
> in http://www.frsirt.com/english/advisories/2008/3164
> Upd
Actually the problem lies within quassel-core (same source package), stupid
me.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: quassel
Severity: grave
Tags: security
Justification: user security hole
Quassel version in Debian is vulnerable to IRC command injection as described
in http://www.frsirt.com/english/advisories/2008/3164
Updated packages are already available at http://quassel.irc.org/ , according
to q
6 matches
Mail list logo