From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 23977 invoked by alias); 9 Sep 2014 18:17:29 -0000 Mailing-List: contact overseers-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: , Sender: overseers-owner@sourceware.org Received: (qmail 23968 invoked by uid 89); 9 Sep 2014 18:17:28 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-3.7 required=5.0 tests=AWL,BAYES_00,RCVD_IN_DNSWL_LOW,RP_MATCHES_RCVD,SPF_HELO_PASS,SPF_PASS autolearn=ham version=3.3.2 X-HELO: elastic.org Received: from elastic.org (HELO elastic.org) (69.20.226.105) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Tue, 09 Sep 2014 18:17:27 +0000 Received: from super.elastic.org (localhost [127.0.0.1]) by elastic.org (8.14.7/8.14.7) with ESMTP id s89IHCLC015611 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 9 Sep 2014 14:17:13 -0400 Received: (from fche@localhost) by super.elastic.org (8.14.7/8.14.7/Submit) id s89IHCbh015610; Tue, 9 Sep 2014 14:17:12 -0400 Date: Tue, 09 Sep 2014 18:17:00 -0000 From: "Frank Ch. Eigler" To: Keith Seitz Cc: overseers@sourceware.org Subject: Re: Fwd: Sourceware Security Vulnerablity Message-ID: <20140909181712.GB13532@elastic.org> References: <540F310C.8030905@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <540F310C.8030905@redhat.com> User-Agent: Mutt/1.5.23 (2014-03-12) X-SW-Source: 2014-q3/txt/msg00149.txt.bz2 Hi - > https://www.sourceware.org/cgi-bin/cvsweb.cgi/libc/login/programs%0A%0A%0A%0A/pt_chown.c?rev=1.12&content-type=text/html&cvsroot=glibc&only_with_tag=MAIN This is fixed by a blunt removal of the ancient cvsweb.cgi code, and a blunt httpd-level redirection to /viewvc, for both sourceware.org and gcc.gnu.org. - FChE