Displaying 20 results from an estimated 6000 matches similar to: "xen-3 stable update for #496367"
2008 Feb 04
1
Bug#464044: xen-unstable: CVE-2007-3919 prone to symlink attack
Source: xen-unstable
Version: 3.0-unstable+hg11561-1
Severity: grave
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-unstable.
CVE-2007-3919[0]:
| (1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local
| users to truncate arbitrary files via a symlink attack on
| /tmp/xenq-shm.
If you fix this vulnerability please also include
2008 Mar 06
1
Bug#469654: xen-unstable: CVE-2008-0928 privilege escalation
Package: xen-unstable
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-unstable.
CVE-2008-0928[0]:
| Qemu 0.9.1 and earlier does not perform range checks for block device
| read or write requests, which allows guest host users with root
| privileges to access arbitrary memory and escape the virtual machine.
If you fix
2007 Nov 17
1
Bug#451626: CVE-2007-5907, CVE-2007-5906 possible denial of service vulnerability
Package: xen-3
Version: 3.1.0-1
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-3.
CVE-2007-5907[0]:
| Xen 3.1.1 does not prevent modification of the CR4 TSC from
| applications, which allows pv guests to cause a denial of service
| (crash).
CVE-2007-5906[1]:
| Xen 3.1.1 allows virtual guest system users to cause a
|
2007 Sep 25
0
Bug#444007: CVE-2007-1320 multiple heap based buffer overflows
Package: xen-3.0
Version: 3.0.3-0-2
Severity: grave
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-3.0.
CVE-2007-1320[0]:
| Multiple heap-based buffer overflows in the cirrus_invalidate_region
| function in the Cirrus VGA extension in QEMU 0.8.2 might allow local
| users to execute arbitrary code via unspecified vectors related to
|
2007 Sep 28
0
Bug#444430: CVE-2007-4993 privilege escalation
Package: xen-3.0
Version: 3.0.3-0-2
Severity: grave
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-3.0.
CVE-2007-4993[0]:
| pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest
| domain, allows local users with elevated privileges in the guest domain to
| execute arbitrary commands in domain 0 via a crafted grub.conf
2007 Oct 15
1
Bug#446771: CVE-2007-4993 privilege escalation
tags 446771 + patch
thanks
Hi,
attached is a patch to fix this if you don't already have
one.
Kind regards
Nico
--
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: CVE-2007-4993.patch
Type: text/x-diff
Size: 4742
2008 Jun 19
0
Bug#487095: Bug#487095: xen-3: multiple security issues
reopen 487095
reopen 487097
thanks
Hi,
since you thought it's necessary to complain to me about
this bug report on IRC I'm replying to this bug now as well.
> On Thu, Jun 19, 2008 at 04:56:54PM +0200, Thomas Bl?sing wrote:
> > CVE-2008-1943[0]:
> > | Buffer overflow in the backend of XenSource Xen Para Virtualized Frame
> > | Buffer (PVFB) 3.0 through 3.1.2 allows
2007 Oct 15
0
Processed: reassign 444430 to xen-3.0, cloning 444430, reassign -1 to xen-3, closing 444430
Processing commands for control at bugs.debian.org:
> # Automatically generated email from bts, devscripts version 2.9.26
> reassign 444430 xen-3.0 3.0.3-0-2
Bug#444430: CVE-2007-4993 privilege escalation
Bug reassigned from package `xen-3' to `xen-3.0'.
> clone 444430 -1
Bug#444430: CVE-2007-4993 privilege escalation
Bug 444430 cloned as bug 446771.
> reassign -1 xen-3
2007 Oct 22
0
Processed: closing 446771
Processing commands for control at bugs.debian.org:
> # Automatically generated email from bts, devscripts version 2.9.26
> close 446771 3.1.1-1
Bug#446771: CVE-2007-4993 privilege escalation
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 3.1.1-1, send any further explanations to Nico Golde <nion at debian.org>
>
End
2008 Apr 04
0
Processed: reassign 469662 to xen-unstable, closing 469662
Processing commands for control at bugs.debian.org:
> # Automatically generated email from bts, devscripts version 2.9.26
> reassign 469662 xen-unstable
Bug#469662: xen-3: CVE-2008-0928 privilege escalation
Bug reassigned from package `xen-3' to `xen-unstable'.
> close 469662 3.3-unstable+hg17192-1
Bug#469662: xen-3: CVE-2008-0928 privilege escalation
'close' is
2008 Jun 19
3
Bug#487097: xen-unstable: multiple security issues
Source: xen-unstable
Version: 3.3-unstable+hg17602-1
Severity: grave
Tags: security, patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for xen-unstable.
CVE-2008-1943[0]:
| Buffer overflow in the backend of XenSource Xen Para Virtualized Frame
| Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial
| of service (crash) and possibly execute
2008 Aug 25
0
Processed: tagging 496367
Processing commands for control at bugs.debian.org:
> # Automatically generated email from bts, devscripts version 2.10.35
> tags 496367 pending
Bug#496367: The possibility of attack with the help of symlinks in some Debian packages
There were no tags set.
Tags added: pending
>
End of message, stopping processing here.
Please contact me if you need assistance.
Debian bug tracking
2010 Mar 19
5
Encrypt/decrypt in R
Hi all,
Does any one know of any encryption/decryption algorithms in R? I'm
not looking for anything robust - I want some way of printing output
to the screen that the user can't read immediately, but can decrypt a
little later. The main thing I don't want to the user to see is a
number, so (e.g.) ROT13 isn't appropriate.
Hadley
--
Assistant Professor / Dobelman Family Junior
2007 Dec 24
3
[new user] some features requests ...
Hi,
After many tries, i''ve decided to give up dynamic websites, which
definitely do not match my needs, and instead replace my blog by a
webgen site. I''ve however some unanswered questions.
1) RSS
One of the main interest of dynamic website is the ability to provide
user a view to last updated pages, thanks to RSS. Is there a way for
webgen to generate a RSS file from last
2006 Apr 26
0
sendmail and telenet (Belgian isp)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Telenet blocks all acces on port 25 so sendmail cannot send mail directly.
the solution is to give your box a hostname under the telenet.be domain
and then use mail-out.pandora.be as forwarder.
- --
nightrid3r
Services Master
Network Administrator
Botmaster
Chatfactory network
http://www.chatfactory.net
This message has been double ROT13 encoded
2008 Aug 24
2
Bug#496367: The possibility of attack with the help of symlinks in some Debian packages
Package: xen-utils-3.2-1
Severity: grave
Hi, maintainer!
This message about the error concerns a few packages at once. I've
tested all the packages (for Lenny) on my Debian mirror. All scripts
of packages (marked as executable) were tested.
In some packages I've discovered scripts with errors which may be used
by a user for damaging important system files or user's files.
For
2005 May 01
6
win32-changejournal 0.2.0-1 compile error
I get the following error when trying to compile:
win32-changejournal-0.2.0-1
on:
Windows 2000, Service Pack 4
Microsoft Visual Studio 6
Any ideas? Thanks,
Zach
----- ERROR BELOW-----
C:\unzipped\win32-changejournal-0.2.0-1\win32-changejournal-0.2.0>nmake
Microsoft (R) Program Maintenance Utility Version 6.00.9782.0
Copyright (C) Microsoft Corp 1988-1998. All rights reserved.
2009 Jun 30
0
xen-3_3.4.0-1_amd64.changes is NEW
libxen-dev_3.4.0-1_amd64.deb
to pool/main/x/xen-3/libxen-dev_3.4.0-1_amd64.deb
libxenstore3.0_3.4.0-1_amd64.deb
to pool/main/x/xen-3/libxenstore3.0_3.4.0-1_amd64.deb
xen-3_3.4.0-1.diff.gz
to pool/main/x/xen-3/xen-3_3.4.0-1.diff.gz
xen-3_3.4.0-1.dsc
to pool/main/x/xen-3/xen-3_3.4.0-1.dsc
xen-3_3.4.0.orig.tar.gz
to pool/main/x/xen-3/xen-3_3.4.0.orig.tar.gz
(new)
2019 Aug 18
0
Documenting else's greed
Indeed, an example in the documentation about this feature would be helpful, may be the one Hugh used. If an explanation is deemed appropriate, I would suggest including something along the lines of the following
(after the second paragraph of the Details section for if/while/etc.).
===============
In these constructs the opening braces, if any, are part of the expression to be evaluated, not
2007 Sep 24
6
monthly meeting?
Wednesday next week would be the Xiph monthly meeting.
It is there enough going on at the moment (IETF document
being submitted soon, the various aspects of metadata)
to warrant one?
--
imalone