| Summary: | Mozilla Partially Vulnerable to Internet Explorer URL Spoofing Security Flaw | ||
|---|---|---|---|
| Product: | Gentoo Linux | Reporter: | Hanno Böck <hanno> |
| Component: | Current packages | Assignee: | Mozilla Gentoo Team <mozilla> |
| Status: | RESOLVED FIXED | ||
| Severity: | normal | CC: | centic, security |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | All | ||
| URL: | http://www.mozillazine.org/talkback.html?article=4078 | ||
| Whiteboard: | |||
| Package list: | Runtime testing required: | --- | |
|
Description
Hanno Böck
2003-12-12 04:13:11 UTC
Reassinging bug to our mozilla team as there is not alot our security team can do about this other than wait for mozilla-1.6 final. The decision to add/reject http://bugzilla.mozilla.org/attachment.cgi?id=137275&action=edit will have to be up to our mozilla team as well. Hanno, azarah, agriffis, brad make up the mozilla@ alias and none of them seem to have any input. What do you think should happen here? Are you going to add the patches to portage and take care of mozilla now that the upstream bug has been resolved? Hmmm, I never actually saw this before! Anyway, we're at 1.6 now, so this is resolved. |