[Pkg-roundcube-maintainers] Processed: tagging 962123, tagging 962124 ...
Debian Bug Tracking System
owner at bugs.debian.org
Thu Jun 11 12:57:05 BST 2020
Processing commands for control at bugs.debian.org:
> tags 962123 + fixed-upstream upstream
Bug #962123 {Done: Guilhem Moulin <guilhem at debian.org>} [src:roundcube] roundcube: Cross-Site Scripting (XSS) vulnerability in template object 'username'
Added tag(s) upstream and fixed-upstream.
> tags 962124 + fixed-upstream upstream
Bug #962124 {Done: Guilhem Moulin <guilhem at debian.org>} [src:roundcube] roundcube: Cross-Site Scripting (XSS) vulnerability via malicious XML messages
Added tag(s) fixed-upstream and upstream.
> retitle 962124 roundcube: CVE-2020-13964: Cross-Site Scripting (XSS) vulnerability in template object 'username'
Bug #962124 {Done: Guilhem Moulin <guilhem at debian.org>} [src:roundcube] roundcube: Cross-Site Scripting (XSS) vulnerability via malicious XML messages
Changed Bug title to 'roundcube: CVE-2020-13964: Cross-Site Scripting (XSS) vulnerability in template object 'username'' from 'roundcube: Cross-Site Scripting (XSS) vulnerability via malicious XML messages'.
> retitle 962123 roundcube: CVE-2020-13965: Cross-Site Scripting (XSS) vulnerability via malicious XML messages
Bug #962123 {Done: Guilhem Moulin <guilhem at debian.org>} [src:roundcube] roundcube: Cross-Site Scripting (XSS) vulnerability in template object 'username'
Changed Bug title to 'roundcube: CVE-2020-13965: Cross-Site Scripting (XSS) vulnerability via malicious XML messages' from 'roundcube: Cross-Site Scripting (XSS) vulnerability in template object 'username''.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
962123: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962123
962124: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962124
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
More information about the Pkg-roundcube-maintainers
mailing list