Displaying 20 results from an estimated 700 matches similar to: "[vuxml] editors/vim: document netrw issues"
2008 Nov 22
0
[patch] [vuxml] net/wireshark: fix DoS in SMTP dissector
>Submitter-Id: current-users
>Originator: Eygene Ryabinkin
>Organization: Code Labs
>Confidential: no
>Synopsis: [patch] [vuxml] net/wireshark: fix DoS in SMTP dissector
>Severity: serious
>Priority: high
>Category: ports
>Class: sw-bug
>Release: FreeBSD 7.1-PRERELEASE i386
>Environment:
System: FreeBSD 7.1-PRERELEASE i386
>Description:
Today the DoS
2004 Apr 19
0
VuXML and FreeBSD
Hello All,
I'd like to bring to your attention the Vulnerabilities and eXposures
Markup Language (VuXML) and associated resources.
VuXML is a markup language designed for the documentation of security
issues within a single package collection. Since about February
of this year, we have been diligently documenting vulnerabilities
in FreeBSD and the FreeBSD Ports Collection using VuXML. The
2007 Apr 17
0
VuXML entry for CVE-2007-1870: ClamAV CAB File Unstore Buffer Overflow
Good day.
Spotted the CVE-2007-1870: the clamav 0.90.2 is already in the ports,
but no sign of the issue in the VuXML. The entry is attached. One
thing that is a bit strange is that the ChangeLog for the ClamAV
(http://svn.clamav.net/svn/clamav-devel/trunk/ChangeLog) says about
CVE-2007-1997 as the libclamav/cab.c log entry, but I think they are
messed the numbers -- there is no such CVE, at
2005 Feb 22
0
VuXML.org improvements
Hello Everyone,
I have made a few small changes to the VuXML.org web sites,
http://www.vuxml.org/freebsd/ (aka vuxml.freebsd.org)
and http://www.vuxml.org/openbsd/
- Date-oriented indices (e.g. entry date index) visually group entries
from the same date.
- The package name index is more useful, listing individual package names.
- Each package referenced in VuXML now has its own index
2008 Nov 13
0
ports/128837: [vuxml] net-mgmt/net-snmp and net-mgmt/net-snmp53: CVE-2008-4309
I thought I had added Cc to the freebsd-security, but I hadn't seen
the PR in the list. So I am bouncing this message to the freebsd-security.
Thu, Nov 13, 2008 at 11:00:11AM +0000, FreeBSD-gnats-submit@FreeBSD.org wrote:
> http://www.freebsd.org/cgi/query-pr.cgi?pr=128837
>
> >Category: ports
> >Responsible: freebsd-ports-bugs
> >Synopsis: [vuxml]
2007 Jan 10
1
Recent vulnerabilities in xorg-server
Colin, good day!
Spotted two patches for x11-servers/xorg-server port: see entries for
x11r6.9.0-dbe-render.diff and x11r6.9.0-cidfonts.diff at
http://xorg.freedesktop.org/releases/X11R6.9.0/patches/index.html
Seems like they are not applied to the xorg-server-6.9.0_5. May be
it should be added to the VuXML document?
There is a ports/107733 issue that incorporates these patches. May
be you
2004 May 03
1
Bad VuXML check on PNG port ?
Hello,
The current png-1.2.5_4 port has no more vulnerability.
It has been corrected by ache@FreeBSD.org yesterday.
But when i try to install the updated port to remplace
the vulnerable one this is what i am told :
# make install
===> png-1.2.5_4 has known vulnerabilities:
>> libpng denial-of-service.
Reference:
2004 Aug 06
0
one more try..
its just a common util that floats around the net. everyones got it or
you can go to google and enter mkpasswd.c and turn up lots of hits.
or i got this from icecast CVS 1.1 you can cut it into a file, compile and
run. note the freshness date :)
---------------------------->snip here, put in .c file, compile<---------
/* simple password generator by Nelson Minar (minar@reed.edu)
*
2013 Nov 06
0
CESA-2013:X012 Xen4CentOS Medium kernel Security Update
CentOS Errata and Security Advisory 2013:X012 (Xen4CentOS)
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
-----------------------------
X86_64
-----------------------------
2eb1022ec7ec2d508248c9c152e253aa72acfa08a155701d2791b1458766590a e1000e-2.5.4-3.4.68.2.el6.centos.alt.x86_64.rpm
2013 Nov 07
0
CentOS-announce Digest, Vol 105, Issue 5
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2014 Oct 01
0
CESA-2014:X011 Moderate kernel Xen4CentOS Security Update
CentOS Errata and Security Advisory 2014:X011 (Xen4CentOS)
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
-----------------------------
X86_64
-----------------------------
0ca23e081ddc488aa22b357fd2ad46b26526424f4613f5af7254bcbdcbcf1474 e1000e-2.5.4-3.10.55.2.el6.centos.alt.x86_64.rpm
2014 Jun 16
0
CESA-2014:X009 Important: Xen4CentOS kernel Security Update
CentOS Errata and Security Advisory 2014:X009 (Xen4CentOS)
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
-----------------------------
X86_64
-----------------------------
b46a8cc4391424f463aec8e81e716152357426ae3601857b2661bc5a1257f9b3 e1000e-2.5.4-3.10.43.2.el6.centos.alt.x86_64.rpm
2017 May 26
2
Severity of unpublished CVE-2017-2619 and CVE-2017-7494
Thanks for the analysis of second bug.
Please also share CVSSv3 score for first bug.
Arjit Kumar
On Fri, May 26, 2017 at 12:29 PM, Andrew Bartlett <abartlet at samba.org>
wrote:
> On Fri, 2017-05-26 at 11:36 +0530, Arjit Gupta via samba wrote:
> > Hi Team,
> >
> > Please let me know the severity of CVE-2017-2619 and CVE-2017-7494.
>
> They are not unpublished:
2013 Dec 28
0
CESA-2013:X018 Important Xen4CentOS kernel Security Update
CentOS Errata and Security Advisory 2013:X018 (Xen4CentOS)
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
-----------------------------
X86_64
-----------------------------
2ac8f3b6799eac04c6fc5fe054a68d00bdf914f173087a7802c9bce8b4366e48 e1000e-2.5.4-3.10.25.2.el6.centos.alt.x86_64.rpm
2017 May 26
0
Severity of unpublished CVE-2017-2619 and CVE-2017-7494
On Fri, 2017-05-26 at 11:36 +0530, Arjit Gupta via samba wrote:
> Hi Team,
>
> Please let me know the severity of CVE-2017-2619 and CVE-2017-7494.
They are not unpublished:
https://www.samba.org/samba/security/CVE-2017-2619.html
https://www.samba.org/samba/security/CVE-2017-7494.html
For this second bug, I did some work on CVSS scores:
I've had a go at a CVSSv3 score for the
2014 Jun 17
0
CentOS-announce Digest, Vol 112, Issue 7
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2013 May 19
1
[PATCH 1/1] guestfish: Tab-complete single / double quoted filenames containing space -- add fish_completion_word_break_characters_hook
This patch introduces fish_completion_word_break_characters_hook - Readline's
rl_completion_word_break_hook for guestfish so tab-completion on / for single /
double quoted filenames containing space would be possible too - this covers
part:
"In addition:
><fs> ls "/Program Files/<tab>
doesn't show any files to complete."
from RH BZ#547488.
Thank
2013 Dec 29
0
CentOS-announce Digest, Vol 106, Issue 15
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2014 Oct 02
0
CentOS-announce Digest, Vol 116, Issue 2
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2013 Jun 21
0
CESA-2013:0620-01 Important Xen4CentOS kernel Update
CentOS Errata and Security Advisory 2013:0620-01 Important (Xen4CentOS)
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
a8a913de2ce129fe28c1015d2be0ca72acbb70eb7b4e41ef470f8fdc3d70c6ad
kernel-3.4.50-8.el6.centos.alt.x86_64.rpm
b01179ca3023f3f3503fe71f8efbdecee9f01f6be552c2a35c91909fe652574f