Author: nion Date: 2008-04-29 21:24:55 +0000 (Tue, 29 Apr 2008) New Revision: 8650 Modified: data/CVE/list Log: new/old wordpress issue fixed in 2.2.3-1, cve id requested Modified: data/CVE/list ==================================================================--- data/CVE/list 2008-04-29 20:49:42 UTC (rev 8649) +++ data/CVE/list 2008-04-29 21:24:55 UTC (rev 8650) @@ -1,3 +1,6 @@ +CVE-2008-XXXX [privilege escalation in wordpress] + - wordpress 2.2.3-1 + NOTE: CVE id requested CVE-2008-XXXX [peercast buffer overflow in HTTP::getAuthUserPass] - peercast <unfixed> (medium; bug #478573) NOTE: CVE id requested
Thijs Kinkhorst
2008-May-01 13:50 UTC
[Secure-testing-team] [Secure-testing-commits] r8650 - data/CVE
On Tuesday 29 April 2008 23:24, nion at alioth.debian.org wrote:> ? ?data/CVE/list > Log: > new/old wordpress issue fixed in 2.2.3-1, cve id requested > > Modified: data/CVE/list > ==================================================================> --- data/CVE/list???????2008-04-29 20:49:42 UTC (rev 8649) > +++ data/CVE/list???????2008-04-29 21:24:55 UTC (rev 8650) > @@ -1,3 +1,6 @@ > +CVE-2008-XXXX [privilege escalation in wordpress] > +???????- wordpress 2.2.3-1 > +???????NOTE: CVE id requestedPlease, when adding a non-CVE entry, add a pointer to the source of the information, be it some URL, Debian bug, upstream bug number etc. As long as there''s no CVE id (which has those references) it''s quite impossible to deduce which bug you mean by the terse description. thanks, Thijs -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 481 bytes Desc: not available Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080501/1de64ee0/attachment.pgp