A recent kernel exploit was released that allowed a non admin user to 
escalate privileges on the host pr-shell1. We urge all users who 
frequent this host to change their password immediately and check their 
project group space for any tampering. As a precaution, we have blocked 
access to all project resources by password until the user resets their 
password. After the password has been reset, project resources should be 
accessible within 5 minutes.

https://sourceforge.net/forum/forum.php?forum_id=591370

This is also true for all committees of qooxdoo.

Sebastian


-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
qooxdoo-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/qooxdoo-devel

Reply via email to