-
moin (1.9.3-1ubuntu3.1) quantal-security; urgency=low
* SECURITY UPDATE: arbitrary code execution via anywikidraw/twikidraw
- debian/patches/CVE-2012-XXXX.patch: adjust action/anywikidraw.py and
action/twikidraw.py to use wikiutil.taintfilename()
- CVE-2012-XXXX
* SECURITY UPDATE: path traversal via AttachFile
- debian/patches/CVE-2012-YYYY.patch: adjust action/AttachFile.py to use
wikiutil.taintfilename()
- CVE-2012-YYYY
-- Jamie Strandboge <email address hidden> Sat, 29 Dec 2012 18:22:20 -0600
-
moin (1.9.3-1ubuntu3) quantal; urgency=low
* SECURITY UPDATE: cross-site scripting issue in reStructuredText parser
- debian/patches/CVE-2011-1058.patch: remove javascript support in
MoinMoin/parser/text_rst.py.
- CVE-2011-1058
* SECURITY UPDATE: incorrect permissions due to broken virtual group
names handling
- debian/patches/CVE-2012-4404.patch: fix group test in
MoinMoin/security/__init__.py, added test in
MoinMoin/security/_tests/test_security.py.
- CVE-2012-4404
-- Marc Deslauriers <email address hidden> Wed, 10 Oct 2012 10:13:05 -0400
-
moin (1.9.3-1ubuntu2) precise; urgency=low
* Build using dh_python2
-- Matthias Klose <email address hidden> Sat, 17 Dec 2011 13:16:29 +0000