[Bug 1102178] VUL-1: CVE-2018-14505: mitmproxy: mitmweb allows DNS Rebinding attacks, related totools/web/app.py.
http://bugzilla.suse.com/show_bug.cgi?id=1102178 http://bugzilla.suse.com/show_bug.cgi?id=1102178#c3 Karol Babioch <kbabioch@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED CC| |aloisio@gmx.com Resolution|FIXED |--- Flags| |needinfo?(aloisio@gmx.com) --- Comment #3 from Karol Babioch <kbabioch@suse.com> --- First of all: Thank you very much for your submission and taking care of this. The backport itself looks fine. However, there are a couple of formalities we have to insist on: - Please put a bug reference for each fixed bug in the changes file, i.e. something like boo#1102178 in the paragraph describing the fix for this vulnerability. This make sure our automated systems will pick up the change and notice that a particular codestream is fixed. - Please do not close the bug. Re-assign them back to security@suse.de/com. We will take it up from there, i.e. make sure that all codestreams are fixed before closing the bug. Thank you again for your contributions, keep up the good work, and don't bother too much about this overhead. This is just a workflow that is working good for us. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com