On 19/01/13 21:01, Salvatore Bonaccorso wrote:
> Hi
>
> On Sat, Jan 19, 2013 at 08:36:08PM +0100, Yves-Alexis Perez wrote:
>> On sam., 2013-01-19 at 10:09 +0100, Salvatore Bonaccorso wrote:
>>> By passing g= argument, it is possible to traverse the path and load
>>> another file and execute code
Hi
On Sat, Jan 19, 2013 at 08:36:08PM +0100, Yves-Alexis Perez wrote:
> On sam., 2013-01-19 at 10:09 +0100, Salvatore Bonaccorso wrote:
> > By passing g= argument, it is possible to traverse the path and load
> > another file and execute code from it.
> >
> > Attached is the debdiff against 3.1.7
On sam., 2013-01-19 at 10:09 +0100, Salvatore Bonaccorso wrote:
> By passing g= argument, it is possible to traverse the path and load
> another file and execute code from it.
>
> Attached is the debdiff against 3.1.7-1 in squeeze.
Part of the diff (the is_numeric() parts mainly) seems missing.
Hi Daniel
Thanks for you followup! Even better if you (or someone else of
pkg-monitoring team) can do the security upload:
On Sat, Jan 19, 2013 at 11:22:47AM +0100, Daniel Pocock wrote:
> Just following up on this
>
> - - I've added pkg-monitoring-maintain...@lists.alioth.debian.org to the
> CC,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 19/01/13 10:09, Salvatore Bonaccorso wrote:
> Hi Yves,
>
> On Mon, Jan 07, 2013 at 09:32:48PM +0100, Yves-Alexis Perez wrote:
>> On lun., 2013-01-07 at 09:11 +0100, Daniel Pocock wrote:
>>> On 07/01/13 07:27, Yves-Alexis Perez wrote:
On lu
Hi Yves,
On Mon, Jan 07, 2013 at 09:32:48PM +0100, Yves-Alexis Perez wrote:
> On lun., 2013-01-07 at 09:11 +0100, Daniel Pocock wrote:
> > On 07/01/13 07:27, Yves-Alexis Perez wrote:
> > > On lun., 2013-01-07 at 00:35 +0100, Daniel Pocock wrote:
> > >
> > >> Yes, the 3.1.8 security fix from ups
On lun., 2013-01-07 at 09:11 +0100, Daniel Pocock wrote:
> On 07/01/13 07:27, Yves-Alexis Perez wrote:
> > On lun., 2013-01-07 at 00:35 +0100, Daniel Pocock wrote:
> >
> >> Yes, the 3.1.8 security fix from upstream has been packaged and has
> >> been waiting for security team to process through
On 07/01/13 07:27, Yves-Alexis Perez wrote:
> On lun., 2013-01-07 at 00:35 +0100, Daniel Pocock wrote:
>
>> Yes, the 3.1.8 security fix from upstream has been packaged and has
>> been waiting for security team to process through to the archive
>>
> Can you elaborate on that?
>
http://b
On lun., 2013-01-07 at 00:35 +0100, Daniel Pocock wrote:
> Yes, the 3.1.8 security fix from upstream has been packaged and has
> been waiting for security team to process through to the archive
Can you elaborate on that?
--
Yves-Alexis
signature.asc
Description: This is a digitally signed messa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/01/13 16:21, Salvatore Bonaccorso wrote:
> Hi Daniel
>
> On Wed, Aug 15, 2012 at 05:49:00PM +, Daniel Pocock wrote:
>> Upstream have released 3.1.8 which only differs from 3.1.7 by
>> adding the fix for the security issue
>>
>> It has n
Hi Daniel
On Wed, Aug 15, 2012 at 05:49:00PM +, Daniel Pocock wrote:
> Upstream have released 3.1.8 which only differs from 3.1.7 by adding the
> fix for the security issue
>
> It has now been pushed to the git.debian.org VCS for building the
> Ganglia package
>
> It is on the squeeze branch
Upstream have released 3.1.8 which only differs from 3.1.7 by adding the
fix for the security issue
It has now been pushed to the git.debian.org VCS for building the
Ganglia package
It is on the squeeze branch and ready for someone to build and upload a
binary package
Regards,
Daniel
--
T
12 matches
Mail list logo