> I tried to help with front desk work today
May I ask why? There is a frontdesk "rota" to avoid duplicate work of
this sort and, as you have now noticed, there was not a significant
backlog if any, especially with respect to issues that have no resolution
and still need checking..
Regards,
--
Hi,
I tried to help with front desk work today, but unfortunately I sent
some redundant emails because I did not realize that they had already
been sent. Sorry, I'll take more care before start to send these kind of
emails.
Regards.
--
Lucas Kanashiro
8ED6 C3F8 BAC9 DB7F C130 A870 F823 A272
Le 20/07/2016 à 22:43, Lucas Kanashiro a écrit :
> the Debian LTS team would like to fix the security issues which are
> currently open in the Wheezy version of shadow:
> https://security-tracker.debian.org/tracker/CVE-2016-2141
>
> Would you like to take care of this yourself?
Hi Lucas,
I
Hello dear maintainer(s),
the Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of shadow:
https://security-tracker.debian.org/tracker/CVE-2016-2141
Would you like to take care of this yourself?
If yes, please follow the workflow we have
Hello dear maintainer(s),
the Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of shadow:
https://security-tracker.debian.org/tracker/CVE-2016-6232
Would you like to take care of this yourself?
If yes, please follow the workflow we have
Hello dear maintainer(s),
the Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of pdns:
https://security-tracker.debian.org/tracker/CVE-2016-6172
Would you like to take care of this yourself?
If yes, please follow the workflow we have defined
Hello dear maintainer(s),
the Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of shadow:
https://security-tracker.debian.org/tracker/CVE-2016-6251
https://security-tracker.debian.org/tracker/CVE-2016-6252
Would you like to take care of this
On 07/20/2016 02:23 PM, Markus Koschany wrote:
> Hi,
>
> Feel free to work on everything you like. Fixing CVE-2014-9587 together
> with CVE-2016-4069 isn't strictly required but you could probably reuse
> some of your work if you try to tackle these issue. In any case the
> whole CSRF complex
Hi Markus,
On 07/20/2016 01:12 PM, Markus Koschany wrote:
> Hello Lucas,
>
> I have prepared the last update of roundcube and just had a look at your
> patch. Unfortunately a proper fix for CVE-2016-4069 in Wheezy isn't as
> simple as it looks like on first glance. The whole foundation to
Hello dear maintainer(s),
the Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of roundcube:
https://security-tracker.debian.org/tracker/CVE-2016-4069
I missed the first contact where I should answer if you want to do it
or leave it to us,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Package: apache2
Version: 2.2.22-13+deb7u7
CVE ID : CVE-2016-5387
Scott Geary of VendHQ discovered that the Apache HTTPD server used the
value of the Proxy header from HTTP requests to initialize the
HTTP_PROXY environment
11 matches
Mail list logo