summaryrefslogtreecommitdiffstats
path: root/zarb-ml/mageia-dev/2013-February/022537.html
diff options
context:
space:
mode:
Diffstat (limited to 'zarb-ml/mageia-dev/2013-February/022537.html')
-rw-r--r--zarb-ml/mageia-dev/2013-February/022537.html134
1 files changed, 134 insertions, 0 deletions
diff --git a/zarb-ml/mageia-dev/2013-February/022537.html b/zarb-ml/mageia-dev/2013-February/022537.html
new file mode 100644
index 000000000..f5f956fd5
--- /dev/null
+++ b/zarb-ml/mageia-dev/2013-February/022537.html
@@ -0,0 +1,134 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
+<HTML>
+ <HEAD>
+ <TITLE> [Mageia-dev] Freeze push: ruby-rdoc
+ </TITLE>
+ <LINK REL="Index" HREF="index.html" >
+ <LINK REL="made" HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20ruby-rdoc&In-Reply-To=%3CBAY002-W1265872343532DBB28B9B50D3070%40phx.gbl%3E">
+ <META NAME="robots" CONTENT="index,nofollow">
+ <META http-equiv="Content-Type" content="text/html; charset=us-ascii">
+ <LINK REL="Previous" HREF="022618.html">
+ <LINK REL="Next" HREF="022539.html">
+ </HEAD>
+ <BODY BGCOLOR="#ffffff">
+ <H1>[Mageia-dev] Freeze push: ruby-rdoc</H1>
+ <B>FundaWang</B>
+ <A HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20ruby-rdoc&In-Reply-To=%3CBAY002-W1265872343532DBB28B9B50D3070%40phx.gbl%3E"
+ TITLE="[Mageia-dev] Freeze push: ruby-rdoc">fundawang at fundawang.name
+ </A><BR>
+ <I>Wed Feb 6 17:23:12 CET 2013</I>
+ <P><UL>
+ <LI>Previous message: <A HREF="022618.html">[Mageia-dev] Freeze push: webmin
+</A></li>
+ <LI>Next message: <A HREF="022539.html">[Mageia-dev] Freeze push: ruby-rdoc
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#22537">[ date ]</a>
+ <a href="thread.html#22537">[ thread ]</a>
+ <a href="subject.html#22537">[ subject ]</a>
+ <a href="author.html#22537">[ author ]</a>
+ </LI>
+ </UL>
+ <HR>
+<!--beginarticle-->
+<PRE>Hello,
+Could somebody push ruby-rdoc 3.12.1 into cauldron? It fixed CVE-2013-0256:
+RDoc documentation generated by rdoc 2.3.0 through rdoc 3.12 and prereleases up
+to rdoc 4.0.0.preview2.1 are vulnerable to an XSS exploit. This exploit may
+lead to cookie disclosure to third parties.
+
+Regards.
+</PRE>
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+<!--endarticle-->
+ <HR>
+ <P><UL>
+ <!--threads-->
+ <LI>Previous message: <A HREF="022618.html">[Mageia-dev] Freeze push: webmin
+</A></li>
+ <LI>Next message: <A HREF="022539.html">[Mageia-dev] Freeze push: ruby-rdoc
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#22537">[ date ]</a>
+ <a href="thread.html#22537">[ thread ]</a>
+ <a href="subject.html#22537">[ subject ]</a>
+ <a href="author.html#22537">[ author ]</a>
+ </LI>
+ </UL>
+
+<hr>
+<a href="https://www.mageia.org/mailman/listinfo/mageia-dev">More information about the Mageia-dev
+mailing list</a><br>
+</body></html>