[Bug 1474013] Re: patch for CVE-2015-4634

2017-02-13 Thread Mathew Hodson
*** This bug is a duplicate of bug 1663891 *** https://bugs.launchpad.net/bugs/1663891 ** This bug has been marked a duplicate of bug 1663891 Security uploads for cacti (trusty and xenial) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1474013] Re: patch for CVE-2015-4634

2016-04-24 Thread Paul Gevers
Fix released some time ago. cacti (0.8.8e+ds1-1) unstable; urgency=high * Imported Upstream version 0.8.8e - CVE-2015-4634 multiple SQL Injection vulnerabilities * Add new jquery scripts to Files-Exculded * Refresh patches -- Paul Gevers Wed, 15 Jul 2015 19:47:00

[Bug 1474013] Re: patch for CVE-2015-4634

2016-04-24 Thread Rolf Leggewie
** No longer affects: cacti (Ubuntu Utopic) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1474013 Title: patch for CVE-2015-4634 To manage notifications about this bug go to:

[Bug 1474013] Re: patch for CVE-2015-4634

2015-07-21 Thread Paul Gevers
I just uploaded a version to jessie (Debian) that can be (fake)synced to Vivid and Utopic once accepted by the security team. Unfortunately, I won't have the time to work on the patch for Trusty and Precise for some time to come, but Trusty should be trivial. For Precise, there is a whole stack of

[Bug 1474013] Re: patch for CVE-2015-4634

2015-07-16 Thread Paul Gevers
** Changed in: cacti (Ubuntu) Status: Incomplete = Confirmed ** Changed in: cacti (Ubuntu) Assignee: (unassigned) = Paul Gevers (paul-climbing) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1474013] Re: patch for CVE-2015-4634

2015-07-14 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is