lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20050708111421.xv110sglk4cok4wk@neo.wg.de>
Date: Fri Jul  8 10:14:35 2005
From: jan at horde.org (Jan Schneider)
Subject: Re: [USN-147-1] PHP XMLRPC vulnerability

Zitat von Martin Pitt <martin.pitt@...onical.com>:

> Please note that many applications contain a copy of the affected 
> XMLRPC code,
> which must be fixed separately. The following packages may also be affected,
> but are unsupported in Ubuntu:
>
> - drupal
> - wordpress
> - phpwiki
> - horde3
> - ewiki
> - egroupware
> - phpgroupware

To avoid confusion, I want to make clear that Horde applications are 
NOT affected by this vulnerability because we don't use the vulnerable 
software. I would appreciate if such statements would be cross checked 
with the projects before releasing them to the public.

Jan.

-- 
Do you need professional PHP or Horde consulting?
http://horde.org/consulting/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ