similar to: Bug#451626: CVE-2007-5907, CVE-2007-5906 possible denial of service vulnerability

Displaying 20 results from an estimated 400 matches similar to: "Bug#451626: CVE-2007-5907, CVE-2007-5906 possible denial of service vulnerability"

2008 Feb 04
1
Bug#464044: xen-unstable: CVE-2007-3919 prone to symlink attack
Source: xen-unstable Version: 3.0-unstable+hg11561-1 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xen-unstable. CVE-2007-3919[0]: | (1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local | users to truncate arbitrary files via a symlink attack on | /tmp/xenq-shm. If you fix this vulnerability please also include
2008 Mar 06
1
Bug#469654: xen-unstable: CVE-2008-0928 privilege escalation
Package: xen-unstable Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xen-unstable. CVE-2008-0928[0]: | Qemu 0.9.1 and earlier does not perform range checks for block device | read or write requests, which allows guest host users with root | privileges to access arbitrary memory and escape the virtual machine. If you fix
2007 Sep 25
0
Bug#444007: CVE-2007-1320 multiple heap based buffer overflows
Package: xen-3.0 Version: 3.0.3-0-2 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xen-3.0. CVE-2007-1320[0]: | Multiple heap-based buffer overflows in the cirrus_invalidate_region | function in the Cirrus VGA extension in QEMU 0.8.2 might allow local | users to execute arbitrary code via unspecified vectors related to |
2007 Sep 28
0
Bug#444430: CVE-2007-4993 privilege escalation
Package: xen-3.0 Version: 3.0.3-0-2 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xen-3.0. CVE-2007-4993[0]: | pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest | domain, allows local users with elevated privileges in the guest domain to | execute arbitrary commands in domain 0 via a crafted grub.conf
2007 Oct 15
1
Bug#446771: CVE-2007-4993 privilege escalation
tags 446771 + patch thanks Hi, attached is a patch to fix this if you don't already have one. Kind regards Nico -- Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: CVE-2007-4993.patch Type: text/x-diff Size: 4742
2008 Oct 04
0
xen-3 stable update for #496367
Hi, an insecure temporary file creation was reported to the xen-3 some time ago. This is Debian bug #496367. Unfortunately the vulnerability is not important enough to get it fixed via regular security update in Debian stable. It does not warrant a DSA. However it would be nice if this could get fixed via a regular point update[0]. Please contact the release team for this. This is an
2008 Jun 19
0
Bug#487095: Bug#487095: xen-3: multiple security issues
reopen 487095 reopen 487097 thanks Hi, since you thought it's necessary to complain to me about this bug report on IRC I'm replying to this bug now as well. > On Thu, Jun 19, 2008 at 04:56:54PM +0200, Thomas Bl?sing wrote: > > CVE-2008-1943[0]: > > | Buffer overflow in the backend of XenSource Xen Para Virtualized Frame > > | Buffer (PVFB) 3.0 through 3.1.2 allows
2008 Feb 01
1
DR7 and CR4
Hi, I''m trying to verify that the Xen I''m running is patched against the all the known published bugs. I''m running Fedora 7, which means I''m running Xen 3.1.2. I''ve checked the changelog in the Fedora package, and I can verify that all the bugs I''ve found are fixed except for one. http://www.securityfocus.com/bid/27219
2006 Feb 24
4
Re: Packaing Xen 3.0 etc for Debian
Am Freitag, 24. Februar 2006 11:02 schrieb Matthew Grant: > Ralph, Hi Matthew, > I am a Debian Maintainer who is seriously considering getting Xen into > Debian and Ubuntu. > > I have been installing xen-unstable.hg from source on my AMD 64 and have > been impressed with its relative stability. > > I am prepared to sponsor your packages into Debian if we can get them >
2006 Dec 02
3
Bug#401249: xen-utils-common: xenbr0 not being created
Package: xen-utils-common Version: 3.0.3-0-2 Severity: important I have installed all the packages I can think of to get Xen going and it still fails with the following : /var/log/xen/xend-debug.log: Exception starting xend: (111, 'Connection refused') er.py", line 463, in process_request_thread self.finish_request(request, client_address) File "SocketServer.py",
2006 Oct 02
3
Mongrel cluster FreeBSD rc.d script
Hello all After installing Mongrel, Mongrel Cluster and all it''s dependencies via gems under FreeBSD. Next I have configured all config/mongrel_cluster.yml for each Rails app, then: % mkdir /usr/local/etc/mongrel_cluster and likend each railsapp.yml to it''s refering app/config/mongrel_cluster.yml My question is, after preparing all base configs now I need to add some rc.d
2010 Feb 13
4
Labels on a pyramide
I am using pyramid.plot() from the plotrix package. I have something like this ############################################ xy.pop<-dados$masfr xx.pop<-dados$femfr #agelabels<-dados$femlab xycol<-color.gradient(c(0,0,0.5,1),c(0,0,0.5,1),c(1,1,0.5,1),11) xxcol<-color.gradient(c(1,1,0.5,1),c(0.5,0.5,0.5,1),c(0.5,0.5,0.5,1),11) xylab<-dados$maslab xxlab<-dados$femlab
2008 Jun 19
3
Bug#487097: xen-unstable: multiple security issues
Source: xen-unstable Version: 3.3-unstable+hg17602-1 Severity: grave Tags: security, patch Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for xen-unstable. CVE-2008-1943[0]: | Buffer overflow in the backend of XenSource Xen Para Virtualized Frame | Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial | of service (crash) and possibly execute
2010 Jul 08
2
Bug#588477: network-bridge: start: 95 sec sleep/bridge without a default gateway
Package: xen-utils-common Version: 4.0.0-1 Severity: normal Tags: patch do_ifup() in network-bridge exits badly, if the interface doesn't have a default gateway. Since it's wrapped in xen's locking script it causes it to be retied 100 times and sleep for 95 seconds before it continues. In my setup this amounts to: 16 vlans without a default gateway * 95 secs / bridge = 25 minutes
2012 Jun 11
3
Re: Wine + PowerBuilder + Sybase ODBC
aotheoverlord wrote: > > > Maybe I missed it, but could you tell us which version of PowerBuilder you are using? PowerBuilder 7... I tried to compile the application in PowerBuilder 6, but it doesn't works.
2010 Jun 16
2
Parallel computing on Windows (foreach) (Sergey Goriatchev)
foreach (or virtually anything you might use for concurrent programming) only really makes sense if the work the "clients" are doing is substantial enough to overwhelm the communication overhead. And there are many ways to accomplish the same task more or less efficiently (for example, doing blocks of tasks in chunks rather than passing each one as an individual job). But more to the
2013 Jun 08
1
reading a character translation table into R
I have a txt file (attached) that defines equivalents among characters in latin1 (or iso-8859-1), numeric &#xxx; codes, HTML entities and latex equivalents. A portion of the file is shown inline below, but may not be rendered well in this email. I'd like to read this into R to use as a character translation table, but am stuck on two things: - The 5 fields in the file are
2015 Jan 23
0
Easiest way to compile dovecot on Ubuntu 14.04
Am 23.01.2015 um 08:47 schrieb Kevin Laurie: > Dear Marc. > Thanks =) > Already have dovecot-solr installed. > Is there a way to see if dovecot-solr is actually working? Yes. http://wiki2.dovecot.org/Plugins/FTS/Solr - look there at "Testing." Use a mailbox for it with at least some megabytes of data. If you don't see then upgrade notices, it it not working yet. The
2010 Jun 15
3
How to see how a function is written
Hello, If I want to see how, say, apply function is written, how would I be able to do that? Just typing "apply" at the prompt does not work. Thank you for help! Sergey
2002 Mar 17
0
EXT3 corruption when FS is full
Hi, (I'm not subscribed to ext3-users, please CC: me) Kernel: 2.4.18. I've just converted a 100(ish) MiB ext2 filesystem to ext3 (umount, tune2fs -j, e2fsck, mount) and it seems to be happy, except... As a test, I then filled the filesystem up, lastly copying /usr/bin (as root, so the filesystem became brim full). I then umounted it, and ran e2fsck -n -f /dev/hda6, and got the