Displaying 14 results from an estimated 14 matches for "nion".
Did you mean:
union
2008 Feb 04
1
Bug#464044: xen-unstable: CVE-2007-3919 prone to symlink attack
...ncate arbitrary files via a symlink attack on
| /tmp/xenq-shm.
If you fix this vulnerability please also include the CVE id
in your changelog entry.
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3919
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.d...
2008 Mar 06
1
Bug#469654: xen-unstable: CVE-2008-0928 privilege escalation
...ude the CVE id
in your changelog entry.
https://bugzilla.redhat.com/attachment.cgi?id=296005 is the
patch (tools/ioemu/block.c should get patched).
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.d...
2008 Apr 04
0
Processed: reassign 469662 to xen-unstable, closing 469662
...`xen-unstable'.
> close 469662 3.3-unstable+hg17192-1
Bug#469662: xen-3: CVE-2008-0928 privilege escalation
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 3.3-unstable+hg17192-1, send any further explanations to Nico Golde <nion at debian.org>
>
End of message, stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
2008 Oct 04
0
xen-3 stable update for #496367
...elease team for this.
This is an automatically generated mail, in case you are already working on an
upgrade this is of course pointless.
For further information:
[0] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
Url : http://lists.alioth.d...
2007 Sep 25
0
Bug#444007: CVE-2007-1320 multiple heap based buffer overflows
...se have a look at:
http://lists.xensource.com/archives/html/xen-devel/2007-05/msg00021.html
http://xenbits.xensource.com/xen-unstable.hg?rev/9e86260b95a4
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1320
Kind regards
Nico
--
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.d...
2007 Sep 28
0
Bug#444430: CVE-2007-4993 privilege escalation
...via a crafted grub.conf file whose
| contents are used in exec statements.
If you fix this vulnerability please also include the CVE id
in your changelog entry.
For further information:
[0] http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4993
Kind regards
Nico
--
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.d...
2007 Oct 15
0
Processed: reassign 444430 to xen-3.0, cloning 444430, reassign -1 to xen-3, closing 444430
...eassigned from package `xen-3.0' to `xen-3'.
> close 444430 3.0.3-0-3
Bug#444430: CVE-2007-4993 privilege escalation
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 3.0.3-0-3, send any further explanations to Nico Golde <nion at debian.org>
>
End of message, stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
2007 Oct 15
1
Bug#446771: CVE-2007-4993 privilege escalation
tags 446771 + patch
thanks
Hi,
attached is a patch to fix this if you don't already have
one.
Kind regards
Nico
--
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: CVE-2007-4993.patch
Type: text/x-diff
Size: 4742 bytes
Desc: not available
Url : http://lists.alioth.debian.o...
2007 Oct 22
0
Processed: closing 446771
...cally generated email from bts, devscripts version 2.9.26
> close 446771 3.1.1-1
Bug#446771: CVE-2007-4993 privilege escalation
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 3.1.1-1, send any further explanations to Nico Golde <nion at debian.org>
>
End of message, stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
2007 Nov 17
1
Bug#451626: CVE-2007-5907, CVE-2007-5906 possible denial of service vulnerability
...hese issues is linked on the mitre website.
The xen version in etch is also affected.
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5907
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5906
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.d...
2008 Jun 19
0
Bug#487095: Bug#487095: xen-3: multiple security issues
...o make sure to include the
> > CVE ids in your changelog entry.
>
> There is nothing to fix.
If you close this bug again please close it with the proper version
numbers and state why the new versions are not affected anymore.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
Url : http://lists.alioth.d...
2008 Jun 19
3
Bug#487097: xen-unstable: multiple security issues
Source: xen-unstable
Version: 3.3-unstable+hg17602-1
Severity: grave
Tags: security, patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for xen-unstable.
CVE-2008-1943[0]:
| Buffer overflow in the backend of XenSource Xen Para Virtualized Frame
| Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial
| of service (crash) and possibly execute
2005 May 01
6
win32-changejournal 0.2.0-1 compile error
...;fOk''
changejournal.c(61) : error C2065: ''fOk'' : undeclared identifier
changejournal.c(63) : error C2224: left of ''.UsnJournalID'' must have
struct/unio
n type
changejournal.c(64) : error C2224: left of ''.DeleteFlags'' must have
struct/union
type
changejournal.c(65) : error C2065: ''FSCTL_DELETE_USN_JOURNAL'' :
undeclared ident
ifier
changejournal.c(74) : error C2146: syntax error : missing '')'' before
identifier
''pUsnJournalData''
changejournal.c(74) : error C2081: ''PUSN_J...
2013 Apr 18
0
Processed: adding new jessie tag to sid-tagged bugs
...ork for IPv6 with IPv4-style interface aliases
Added tag(s) jessie.
Added tag(s) jessie.
Added tag(s) jessie.
Added tag(s) jessie.
> tags 701323 + jessie
Bug #701323 [src:mod-gearman] mod-gearman: ftbfs with GCC-4.8
Added tag(s) jessie.
> tags 438837 + jessie
Bug #438837 {Done: Nico Golde <nion at debian.org>} [obconf] obconf 2.0.2-1 depends on libobparser16 but it is not installable
Added tag(s) jessie.
> tags 617069 + jessie
Bug #617069 [src:specto] specto: deprecation of dh_pycentral, please use dh_python2
Added tag(s) jessie.
> tags 693640 + jessie
Bug #693640 [spandsp] spand...