Much better, thx.

--jason


On Jul 6, 2010, at 2:08 PM, Mike Rheinheimer wrote:

> Ok, all is well now.  Sorry for the multiple emails and SVN commits.
> OpenOffice and I are no longer on speaking terms, unless I get some
> flowers and a written apology.
> 
> mike
> 
> 
> On Tue, Jul 6, 2010 at 3:44 PM, Mike Rheinheimer <[email protected]> wrote:
>> Yeah, something got messed up.  I'll get a new version uploaded.
>> 
>> mike
>> 
>> 
>> On Tue, Jul 6, 2010 at 3:29 PM, Jason Dillon <[email protected]> wrote:
>>> Thanks, but... is it just me or is there content missing in the PDF?
>>> 
>>> --jason
>>> 
>>> 
>>> On Jul 6, 2010, at 1:20 PM, Mike Rheinheimer wrote:
>>> 
>>>> Ok, changed it to PDF.  Thanks.
>>>> 
>>>> https://svn.apache.org/repos/asf/incubator/wink/trunk/security/CVE-2010-2245.pdf
>>>> 
>>>> mike
>>>> 
>>>> On Tue, Jul 6, 2010 at 1:59 PM, Jason Dillon <[email protected]> wrote:
>>>>> The docx format is not very friendly to share these details... PDF, HTML 
>>>>> or even plain text would be much better IMO.
>>>>> 
>>>>> --jason
>>>>> 
>>>>> 
>>>>> On Jul 6, 2010, at 9:46 AM, Mike Rheinheimer wrote:
>>>>> 
>>>>>> The Wink team recently discovered a security issue that may allow an
>>>>>> attacker to carry out denial of service attacks and to read arbitrary
>>>>>> files on the file system of the node where Wink runs.  Details of the
>>>>>> vulnerability are described in the following advisory:
>>>>>> 
>>>>>> https://svn.apache.org/repos/asf/incubator/wink/trunk/security/CVE-2010-2245.docx
>>>>>> 
>>>>>> This vulnerability may potentially be exploited on any Wink
>>>>>> installation that receives XML messages from untrusted sources. We
>>>>>> strongly recommend to all users who manage this type of installation
>>>>>> to follow the instructions in the above advisory in order to mitigate
>>>>>> the security risk caused by this vulnerability.
>>>>>> 
>>>>>> -- The Wink team
>>>>> 
>>>>> 
>>> 
>>> 
>> 

Reply via email to