Branches for Quantal

Name Status Last Modified Last Commit
lp:ubuntu/quantal/moin 2 Mature 2012-10-10 10:13:05 UTC
36. * SECURITY UPDATE: cross-site scripti...

Author: Marc Deslauriers
Revision Date: 2012-10-10 10:13:05 UTC

* SECURITY UPDATE: cross-site scripting issue in reStructuredText parser
  - debian/patches/CVE-2011-1058.patch: remove javascript support in
    MoinMoin/parser/text_rst.py.
  - CVE-2011-1058
* SECURITY UPDATE: incorrect permissions due to broken virtual group
  names handling
  - debian/patches/CVE-2012-4404.patch: fix group test in
    MoinMoin/security/__init__.py, added test in
    MoinMoin/security/_tests/test_security.py.
  - CVE-2012-4404

lp:ubuntu/quantal-security/moin 2 Mature 2012-12-30 03:56:44 UTC
37. * SECURITY UPDATE: arbitrary code exe...

Author: Jamie Strandboge
Revision Date: 2012-12-29 18:22:20 UTC

* SECURITY UPDATE: arbitrary code execution via anywikidraw/twikidraw
  - debian/patches/CVE-2012-XXXX.patch: adjust action/anywikidraw.py and
    action/twikidraw.py to use wikiutil.taintfilename()
  - CVE-2012-XXXX
* SECURITY UPDATE: path traversal via AttachFile
  - debian/patches/CVE-2012-YYYY.patch: adjust action/AttachFile.py to use
    wikiutil.taintfilename()
  - CVE-2012-YYYY

lp:ubuntu/quantal-updates/moin 2 Mature 2012-12-30 04:19:52 UTC
37. * SECURITY UPDATE: arbitrary code exe...

Author: Jamie Strandboge
Revision Date: 2012-12-29 18:22:20 UTC

* SECURITY UPDATE: arbitrary code execution via anywikidraw/twikidraw
  - debian/patches/CVE-2012-XXXX.patch: adjust action/anywikidraw.py and
    action/twikidraw.py to use wikiutil.taintfilename()
  - CVE-2012-XXXX
* SECURITY UPDATE: path traversal via AttachFile
  - debian/patches/CVE-2012-YYYY.patch: adjust action/AttachFile.py to use
    wikiutil.taintfilename()
  - CVE-2012-YYYY

13 of 3 results