[Bug 316550] Re: CVE-2008-5620- Roundcube vulnerable and actively exploited

otzenpunk reisswolf_nospam at otzenpunkrock.de
Fri Feb 20 11:35:55 UTC 2009


I'm afraid, but I that doesn't seem to work. (hardy-fix.debdiff)

~/src/roundcube-0.1~rc2$ patch -p1 < ../hardy-fix.debdiff 
patching file debian/control
patching file debian/changelog
patching file debian/control.in
patching file debian/patches/series
patching file debian/patches/cve-2008-5619.patch
patching file debian/patches/cve-2008-5620.patch
~/src/roundcube-0.1~rc2$

I suspect, that the mistake has something to do with those additional
plus signs at the beginning of each line:

+--- roundcube-0.1.1.orig/program/lib/html2text.inc	2009-02-19 23:54:37.000000000 -0500
++++ /dev/null	1970-01-01 00:00:00.000000000 +0000
+@@ -1,451 +0,0 @@
+-<?php
+-

I also don't understand the references to /dev/null.
+-/*************************************************************************
+-*                                                                       *
+-
....

-- 
CVE-2008-5620- Roundcube vulnerable and actively exploited
https://bugs.launchpad.net/bugs/316550
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs at lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs




More information about the universe-bugs mailing list