diff options
Diffstat (limited to 'zarb-ml/mageia-dev/2013-February/022539.html')
-rw-r--r-- | zarb-ml/mageia-dev/2013-February/022539.html | 140 |
1 files changed, 140 insertions, 0 deletions
diff --git a/zarb-ml/mageia-dev/2013-February/022539.html b/zarb-ml/mageia-dev/2013-February/022539.html new file mode 100644 index 000000000..15a8b2427 --- /dev/null +++ b/zarb-ml/mageia-dev/2013-February/022539.html @@ -0,0 +1,140 @@ +<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"> +<HTML> + <HEAD> + <TITLE> [Mageia-dev] Freeze push: ruby-rdoc + </TITLE> + <LINK REL="Index" HREF="index.html" > + <LINK REL="made" HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20ruby-rdoc&In-Reply-To=%3C511296FC.10108%40mageia.org%3E"> + <META NAME="robots" CONTENT="index,nofollow"> + <META http-equiv="Content-Type" content="text/html; charset=us-ascii"> + <LINK REL="Previous" HREF="022537.html"> + <LINK REL="Next" HREF="022543.html"> + </HEAD> + <BODY BGCOLOR="#ffffff"> + <H1>[Mageia-dev] Freeze push: ruby-rdoc</H1> + <B>Anne Nicolas</B> + <A HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20ruby-rdoc&In-Reply-To=%3C511296FC.10108%40mageia.org%3E" + TITLE="[Mageia-dev] Freeze push: ruby-rdoc">ennael at mageia.org + </A><BR> + <I>Wed Feb 6 18:46:36 CET 2013</I> + <P><UL> + <LI>Previous message: <A HREF="022537.html">[Mageia-dev] Freeze push: ruby-rdoc +</A></li> + <LI>Next message: <A HREF="022543.html">[Mageia-dev] Freeze push: ruby-rdoc +</A></li> + <LI> <B>Messages sorted by:</B> + <a href="date.html#22539">[ date ]</a> + <a href="thread.html#22539">[ thread ]</a> + <a href="subject.html#22539">[ subject ]</a> + <a href="author.html#22539">[ author ]</a> + </LI> + </UL> + <HR> +<!--beginarticle--> +<PRE>Le 06/02/2013 17:23, FundaWang a écrit : +><i> Hello, +</I>><i> Could somebody push ruby-rdoc 3.12.1 into cauldron? It fixed CVE-2013-0256: +</I>><i> RDoc documentation generated by rdoc 2.3.0 through rdoc 3.12 and prereleases up +</I>><i> to rdoc 4.0.0.preview2.1 are vulnerable to an XSS exploit. This exploit may +</I>><i> lead to cookie disclosure to third parties. +</I>><i> +</I>><i> Regards. +</I> +<A HREF="http://pkgsubmit.mageia.org/uploads/failure/cauldron/core/release/20130206174500.ennael.valstar.446/log">http://pkgsubmit.mageia.org/uploads/failure/cauldron/core/release/20130206174500.ennael.valstar.446/log</A> + +-- +Anne +<A HREF="http://mageia.org">http://mageia.org</A> +</PRE> + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<!--endarticle--> + <HR> + <P><UL> + <!--threads--> + <LI>Previous message: <A HREF="022537.html">[Mageia-dev] Freeze push: ruby-rdoc +</A></li> + <LI>Next message: <A HREF="022543.html">[Mageia-dev] Freeze push: ruby-rdoc +</A></li> + <LI> <B>Messages sorted by:</B> + <a href="date.html#22539">[ date ]</a> + <a href="thread.html#22539">[ thread ]</a> + <a href="subject.html#22539">[ subject ]</a> + <a href="author.html#22539">[ author ]</a> + </LI> + </UL> + +<hr> +<a href="https://www.mageia.org/mailman/listinfo/mageia-dev">More information about the Mageia-dev +mailing list</a><br> +</body></html> |