Processed: limit source to shibboleth-sp2, tagging 555608

Debian Bug Tracking System owner at bugs.debian.org
Thu Nov 12 19:36:14 UTC 2009


Processing commands for control at bugs.debian.org:

> #shibboleth-sp2 (2.3+dfsg-1) unstable; urgency=high
> #
> #  * New upstream release.
> #    - SECURITY: Partial fix for improper handling of URLs that could be
> #      abused for script injection and other cross-site scripting attacks.
> #      The complete fix also requires newer xmltooling and opensaml2
> #      packages.  (Closes: #555608, CVE-2009-3300)
> #    - Avoid shibd crash on dead memcache server.
> #    - Pass the affiliation name to the session initiator.
> #    - Correctly handle a bogus ACS.
> #    - Allow overriding the URL that's passed to the DS.
> #    - Add schema types for new attribute decoders introduced in 2.2.
> #    - Handle success with partial logout in the logout UI code.
> #    - Fix POST data preservation with empty parameters and empty forms.
> #    - Fix SAML 1 specification of attributes in the query plugin.
> #    - Shorten ePTId-type persistent identifiers.
> #    - Use an ID rather than a whole doc reference for generated metadata.
> #    - Fix spelling of scopeDelimiter in the configuration parser, making
> #      the code and documentation match the schema.
> #
> limit source shibboleth-sp2
Limiting to bugs with field 'source' containing at least one of 'shibboleth-sp2'
Limit currently set to 'source':'shibboleth-sp2'

> tags 555608 + pending
Bug #555608 [shibboleth-sp2] CVE-2009-3300
Added tag(s) pending.
>
End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)



More information about the Pkg-shibboleth-devel mailing list