search for: nion

Displaying 14 results from an estimated 14 matches for "nion".

Did you mean: union
2008 Feb 04
1
Bug#464044: xen-unstable: CVE-2007-3919 prone to symlink attack
...ncate arbitrary files via a symlink attack on | /tmp/xenq-shm. If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3919 Kind regards Nico -- Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.alioth.d...
2008 Mar 06
1
Bug#469654: xen-unstable: CVE-2008-0928 privilege escalation
...ude the CVE id in your changelog entry. https://bugzilla.redhat.com/attachment.cgi?id=296005 is the patch (tools/ioemu/block.c should get patched). For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928 Kind regards Nico -- Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.alioth.d...
2008 Apr 04
0
Processed: reassign 469662 to xen-unstable, closing 469662
...`xen-unstable'. > close 469662 3.3-unstable+hg17192-1 Bug#469662: xen-3: CVE-2008-0928 privilege escalation 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug marked as fixed in version 3.3-unstable+hg17192-1, send any further explanations to Nico Golde <nion at debian.org> > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database)
2008 Oct 04
0
xen-3 stable update for #496367
...elease team for this. This is an automatically generated mail, in case you are already working on an upgrade this is of course pointless. For further information: [0] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable Kind regards Nico -- Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 197 bytes Desc: not available Url : http://lists.alioth.d...
2007 Sep 25
0
Bug#444007: CVE-2007-1320 multiple heap based buffer overflows
...se have a look at: http://lists.xensource.com/archives/html/xen-devel/2007-05/msg00021.html http://xenbits.xensource.com/xen-unstable.hg?rev/9e86260b95a4 For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1320 Kind regards Nico -- Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.alioth.d...
2007 Sep 28
0
Bug#444430: CVE-2007-4993 privilege escalation
...via a crafted grub.conf file whose | contents are used in exec statements. If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4993 Kind regards Nico -- Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.alioth.d...
2007 Oct 15
0
Processed: reassign 444430 to xen-3.0, cloning 444430, reassign -1 to xen-3, closing 444430
...eassigned from package `xen-3.0' to `xen-3'. > close 444430 3.0.3-0-3 Bug#444430: CVE-2007-4993 privilege escalation 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug marked as fixed in version 3.0.3-0-3, send any further explanations to Nico Golde <nion at debian.org> > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database)
2007 Oct 15
1
Bug#446771: CVE-2007-4993 privilege escalation
tags 446771 + patch thanks Hi, attached is a patch to fix this if you don't already have one. Kind regards Nico -- Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: CVE-2007-4993.patch Type: text/x-diff Size: 4742 bytes Desc: not available Url : http://lists.alioth.debian.o...
2007 Oct 22
0
Processed: closing 446771
...cally generated email from bts, devscripts version 2.9.26 > close 446771 3.1.1-1 Bug#446771: CVE-2007-4993 privilege escalation 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug marked as fixed in version 3.1.1-1, send any further explanations to Nico Golde <nion at debian.org> > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database)
2007 Nov 17
1
Bug#451626: CVE-2007-5907, CVE-2007-5906 possible denial of service vulnerability
...hese issues is linked on the mitre website. The xen version in etch is also affected. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5907 [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5906 Kind regards Nico -- Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.alioth.d...
2008 Jun 19
0
Bug#487095: Bug#487095: xen-3: multiple security issues
...o make sure to include the > > CVE ids in your changelog entry. > > There is nothing to fix. If you close this bug again please close it with the proper version numbers and state why the new versions are not affected anymore. Kind regards Nico -- Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 197 bytes Desc: not available Url : http://lists.alioth.d...
2008 Jun 19
3
Bug#487097: xen-unstable: multiple security issues
Source: xen-unstable Version: 3.3-unstable+hg17602-1 Severity: grave Tags: security, patch Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for xen-unstable. CVE-2008-1943[0]: | Buffer overflow in the backend of XenSource Xen Para Virtualized Frame | Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial | of service (crash) and possibly execute
2005 May 01
6
win32-changejournal 0.2.0-1 compile error
...;fOk'' changejournal.c(61) : error C2065: ''fOk'' : undeclared identifier changejournal.c(63) : error C2224: left of ''.UsnJournalID'' must have struct/unio n type changejournal.c(64) : error C2224: left of ''.DeleteFlags'' must have struct/union type changejournal.c(65) : error C2065: ''FSCTL_DELETE_USN_JOURNAL'' : undeclared ident ifier changejournal.c(74) : error C2146: syntax error : missing '')'' before identifier ''pUsnJournalData'' changejournal.c(74) : error C2081: ''PUSN_J...
2013 Apr 18
0
Processed: adding new jessie tag to sid-tagged bugs
...ork for IPv6 with IPv4-style interface aliases Added tag(s) jessie. Added tag(s) jessie. Added tag(s) jessie. Added tag(s) jessie. > tags 701323 + jessie Bug #701323 [src:mod-gearman] mod-gearman: ftbfs with GCC-4.8 Added tag(s) jessie. > tags 438837 + jessie Bug #438837 {Done: Nico Golde <nion at debian.org>} [obconf] obconf 2.0.2-1 depends on libobparser16 but it is not installable Added tag(s) jessie. > tags 617069 + jessie Bug #617069 [src:specto] specto: deprecation of dh_pycentral, please use dh_python2 Added tag(s) jessie. > tags 693640 + jessie Bug #693640 [spandsp] spand...