[Pkg-roundcube-maintainers] Processed: tagging 962123, tagging 962124 ...

Debian Bug Tracking System owner at bugs.debian.org
Thu Jun 11 12:57:05 BST 2020


Processing commands for control at bugs.debian.org:

> tags 962123 + fixed-upstream upstream
Bug #962123 {Done: Guilhem Moulin <guilhem at debian.org>} [src:roundcube] roundcube: Cross-Site Scripting (XSS) vulnerability in template object 'username'
Added tag(s) upstream and fixed-upstream.
> tags 962124 + fixed-upstream upstream
Bug #962124 {Done: Guilhem Moulin <guilhem at debian.org>} [src:roundcube] roundcube: Cross-Site Scripting (XSS) vulnerability via malicious XML messages
Added tag(s) fixed-upstream and upstream.
> retitle 962124 roundcube: CVE-2020-13964: Cross-Site Scripting (XSS) vulnerability in template object 'username'
Bug #962124 {Done: Guilhem Moulin <guilhem at debian.org>} [src:roundcube] roundcube: Cross-Site Scripting (XSS) vulnerability via malicious XML messages
Changed Bug title to 'roundcube: CVE-2020-13964: Cross-Site Scripting (XSS) vulnerability in template object 'username'' from 'roundcube: Cross-Site Scripting (XSS) vulnerability via malicious XML messages'.
> retitle 962123 roundcube: CVE-2020-13965: Cross-Site Scripting (XSS) vulnerability via malicious XML messages
Bug #962123 {Done: Guilhem Moulin <guilhem at debian.org>} [src:roundcube] roundcube: Cross-Site Scripting (XSS) vulnerability in template object 'username'
Changed Bug title to 'roundcube: CVE-2020-13965: Cross-Site Scripting (XSS) vulnerability via malicious XML messages' from 'roundcube: Cross-Site Scripting (XSS) vulnerability in template object 'username''.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
962123: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962123
962124: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962124
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems



More information about the Pkg-roundcube-maintainers mailing list