Re: [rfr] wml://security/2006/dsa-119{0,1,2,3,4,5,6,7,8,9}.wml
- To: debian-l10n-french@lists.debian.org
- Subject: Re: [rfr] wml://security/2006/dsa-119{0,1,2,3,4,5,6,7,8,9}.wml
- From: "Stephane Blondon" <stephane.blondon@gmail.com>
- Date: Sat, 3 Mar 2007 12:49:54 +0100
- Message-id: <[🔎] 49c6d2390703030349y5a8738cfif300873aa4b12b10@mail.gmail.com>
- In-reply-to: <[🔎] 20070303114503.GL15980@evy>
- References: <[🔎] 20070302174731.GA9728@free.fr> <[🔎] 20070303104700.GA5345@free.fr> <[🔎] 20070303114503.GL15980@evy>
Je pense qu'il faut aussi rajouter cette modification pour dsa-1191.wml et
dsa-1192.wml :
@@ -28,7 +28,7 @@
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566">CVE-2006-4566</a>
<p>
Priit Laes a rapporté qu'une expression rationnelle JavaScript peut
- déclencher un dépassement de mémoire tampon basé sur une bloc de mémoire,
+ déclencher un dépassement de mémoire tampon basé sur un bloc de mémoire,
cela permet à des attaquants distants de causer un déni de service et
peut-être d'exécuter un code quelconque.
</p>
--
Stephane.
Reply to:
- References:
- [itt] wml://security/2006/dsa-119{0,1,2,3,4,5,6,7,8,9}.wml
- From: Nicolas Bertolissio <nico.bertol@free.fr>
- [rfr] wml://security/2006/dsa-119{0,1,2,3,4,5,6,7,8,9}.wml
- From: Nicolas Bertolissio <nico.bertol@free.fr>
- Re: [rfr] wml://security/2006/dsa-119{0,1,2,3,4,5,6,7,8,9}.wml
- From: Cyril Brulebois <cyril.brulebois@enst-bretagne.fr>
- Prev by Date:
Re: [rfr] wml://security/2006/dsa-119{0,1,2,3,4,5,6,7,8,9}.wml
- Next by Date:
[RFR] man://procps/top/fr.po
- Previous by thread:
Re: [rfr] wml://security/2006/dsa-119{0,1,2,3,4,5,6,7,8,9}.wml
- Next by thread:
[done] wml://security/2006/dsa-119{0,1,2,3,4,5,6,7,8,9}.wml
- Index(es):