Messages by Date
-
2017/04/23
Re: [Pkg-rust-maintainers] Processed: bugs
Ximin Luo
-
2017/04/20
bind9 CVE-2017-3137
Adrian Minta
-
2017/04/20
Bug#857068: Bump libgit2 version to upstream release 0.25.1
Ximin Luo
-
2017/04/19
Re: [SECURITY] [DSA 3823-1] eject security update
Salvatore Bonaccorso
-
2017/04/17
Re: [SECURITY] [DSA 3823-1] eject security update
Hideki Yamane
-
2017/04/13
Technology/Industry Users
eva . bowman
-
2017/04/11
Upcoming stable point release (8.8)
Adam D. Barratt
-
2017/04/06
Re: Re: Strange file atttributes
Aldo Hernandez
-
2017/04/04
Re: Will this iptables script work as an ip6tables script?
Thomas Kapoulas
-
2017/04/04
Re: Will this iptables script work as an ip6tables script?
Gustavo Lima
-
2017/04/04
Re: Will this iptables script work as an ip6tables script?
Gustavo Lima
-
2017/04/04
Will this iptables script work as an ip6tables script?
Jiangsu Kumquat
-
2017/04/04
Re: Details on CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem
Jan Lühr
-
2017/04/03
Re: Details on CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem
Salvatore Bonaccorso
-
2017/04/03
Details on CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem
Jan Lühr
-
2017/04/03
Re: [release-notes/stretch] Release notes sign-off from the security team
Florian Weimer
-
2017/04/03
[release-notes/stretch] Release notes sign-off from the security team
Niels Thykier
-
2017/03/31
Re: Iptables
Russell Coker
-
2017/03/31
firewall
R Calleja
-
2017/03/31
Iptables
R Calleja
-
2017/03/29
Information on Germany
Jenn Miller
-
2017/03/27
Re: [SECURITY] [DSA 3817-1] jbig2dec security update
Chris Boot
-
2017/03/21
Re: ModSecurity Debian 8
Richard Waterbeek
-
2017/03/21
Re: ModSecurity Debian 8
Casper Madsen
-
2017/03/20
Re: ModSecurity Debian 8
Alberto Gonzalez Iniesta
-
2017/03/20
Re: ModSecurity Debian 8
Krzysztof Kokot
-
2017/03/20
ModSecurity Debian 8
[email protected]
-
2017/03/03
Re: HTTPS needs to be implemented for updating
Martin Zobel-Helas
-
2017/03/03
Re: lovely things
Valerya Valdez
-
2017/02/01
Cambiá tu marquesina, lona, vinilo, corporea, obra completa y mas
Dx Corp
-
2017/01/30
Unidentified subject!
Aurelien Jarno
-
2017/01/30
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Johannes Schauer
-
2017/01/30
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Holger Levsen
-
2017/01/30
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Johannes Schauer
-
2017/01/30
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Holger Levsen
-
2017/01/30
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Mattia Rizzolo
-
2017/01/30
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Henrik Ahlgren
-
2017/01/30
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Russell Coker
-
2017/01/29
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Jonathan Wiltshire
-
2017/01/29
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Santiago Vila
-
2017/01/28
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Jonathan Hutchins
-
2017/01/28
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Lupe Christoph
-
2017/01/28
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Bob Weber
-
2017/01/28
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Daniel Reichelt
-
2017/01/28
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Holger Levsen
-
2017/01/28
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Daniel Reichelt
-
2017/01/28
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Christoph Biedl
-
2017/01/28
Some Debian package upgrades are corrupting rsync "quick check" backups
Adam Warner
-
2017/01/23
Re: libapache2-mod-security2 error message
Vincent Deffontaines
-
2017/01/22
libapache2-mod-security2 error message
Tea Wrex
-
2017/01/18
Fattura TIM linea Fissa - Gennaio 2017 - scadenza 12/01/2017
Telecom Italia-TIM
-
2017/01/15
Re: Certificate errors with security.debian.org
Paul Wise
-
2017/01/15
Re: Certificate errors with security.debian.org
Lupe Christoph
-
2017/01/14
Re: Certificate errors with security.debian.org
Scrap
-
2017/01/14
Certificate errors with security.debian.org
Tea Wrex
-
2017/01/14
Re: Upcoming stable point release (8.7)
Adam D. Barratt
-
2017/01/02
Re: /init/main.c issue
Povl Ole Haarlev Olsen
-
2017/01/02
/init/main.c issue
Sticky Chocolate
-
2017/01/02
Re: embedding openssl source in sslcan
Christian Seiler
-
2017/01/02
Re: embedding openssl source in sslcan
Thijs Kinkhorst
-
2016/12/27
Upcoming stable point release (8.7)
Adam D. Barratt
-
2016/12/26
Re: embedding openssl source in sslcan
Hans-Christoph Steiner
-
2016/12/24
Re: embedding openssl source in sslcan
Jonathan Yu
-
2016/12/24
Re: embedding openssl source in sslcan
Moritz Mühlenhoff
-
2016/12/22
Call for testing: upcoming squid3 security update
Salvatore Bonaccorso
-
2016/12/22
embedding openssl source in sslcan
Sebastian Andrzej Siewior
-
2016/12/21
Re: HTTPS needs to be implemented for updating
Christoph Biedl
-
2016/12/21
Re: HTTPS needs to be implemented for updating
Marc Haber
-
2016/12/21
Re: HTTPS needs to be implemented for updating
Joerg Jaspert
-
2016/12/20
Re: HTTPS needs to be implemented for updating
Christoph Biedl
-
2016/12/20
Re: HTTPS needs to be implemented for updating
Sven Hartge
-
2016/12/20
Re: HTTPS needs to be implemented for updating
Hans-Christoph Steiner
-
2016/12/19
Re: [qubes-devel] Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Chris Laprise
-
2016/12/19
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Patrick Schleizer
-
2016/12/19
Re: HTTPS needs to be implemented for updating
Hans-Christoph Steiner
-
2016/12/19
Re: HTTPS needs to be implemented for updating
Casper Thomsen
-
2016/12/18
Re: HTTPS needs to be implemented for updating
Peter Lawler
-
2016/12/18
Re: HTTPS needs to be implemented for updating
datanoise
-
2016/12/18
Re: HTTPS needs to be implemented for updating
Christoph Moench-Tegeder
-
2016/12/17
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Henrique de Moraes Holschuh
-
2016/12/17
HTTPS needs to be implemented for updating
gwmfms06
-
2016/12/17
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Hans-Christoph Steiner
-
2016/12/17
Re: [qubes-devel] Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Adam D. Barratt
-
2016/12/16
Re: [qubes-devel] Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Marek Marczykowski-Górecki
-
2016/12/16
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
David Kalnischkies
-
2016/12/16
Re: [qubes-devel] Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Marek Marczykowski-Górecki
-
2016/12/16
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Julian Andres Klode
-
2016/12/16
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Patrick Schleizer
-
2016/12/16
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
SZÉPE Viktor
-
2016/12/16
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Patrick Schleizer
-
2016/12/15
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Geert Stappers
-
2016/12/15
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Julian Andres Klode
-
2016/12/15
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Paul Wise
-
2016/12/15
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
SZÉPE Viktor
-
2016/12/15
not getting compromised while applying apt-get upgrade for CVE-2016-1252
Patrick Schleizer
-
2016/12/03
Call for testing: upcoming xen security update
Salvatore Bonaccorso
-
2016/11/30
Nortel/Shoretel Users List
amanda palmer
-
2016/11/26
Re: [SECURITY] [DSA 3726-1] imagemagick security update
Luciano Bello
-
2016/11/24
Re: DSA-3721-1 tomcat7 -- security update
Emmanuel Bourg
-
2016/11/24
Re: DSA-3721-1 tomcat7 -- security update
Salvatore Bonaccorso
-
2016/11/23
DSA-3721-1 tomcat7 -- security update
Aser Casas
-
2016/11/22
Re: vulnerability in 8.6
Riku Valli
-
2016/11/22
Re: vulnerability in 8.6
Richard Waterbeek
-
2016/11/19
Re: Wheezy -- Dirty Cow
Corvin Mcpherson
-
2016/11/19
Wheezy -- Dirty Cow
praeponiertesNichts
-
2016/11/16
Re: vulnerability in 8.6
Salvatore Bonaccorso
-
2016/11/16
Re: vulnerability in 8.6
Richard Waterbeek
-
2016/11/13
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
Stephen Dowdy
-
2016/11/13
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
intrigeri
-
2016/11/13
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
Robert Haist
-
2016/11/12
8th annual Competitive Game: From the Earth to the Moon
SCM SA
-
2016/11/10
Re: vulnerability in 8.6
Tino
-
2016/11/10
Re: Handling of "malware" in Debian
W. Martin Borgert
-
2016/11/10
Re: vulnerability in 8.6
advocatux
-
2016/11/10
Re: vulnerability in 8.6
Vladislav Kurz
-
2016/11/10
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
intrigeri
-
2016/11/09
Re: vulnerability in 8.6
Richard Waterbeek
-
2016/11/09
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
Andrew Deck
-
2016/11/09
DSA-3708-1 mat -- security update (What are MAT users to do)?
gwmfms06
-
2016/11/09
Re: Handling of "malware" in Debian
Paul Wise
-
2016/11/09
Re: Handling of "malware" in Debian
Jonathan Wiltshire
-
2016/11/09
Re: [Pkg-mozext-maintainers] Handling of "malware" in Debian
Ximin Luo
-
2016/11/09
Re: [Pkg-mozext-maintainers] Handling of "malware" in Debian
W. Martin Borgert
-
2016/11/09
Re: [Pkg-mozext-maintainers] Handling of "malware" in Debian
Ximin Luo
-
2016/11/09
Re: Handling of "malware" in Debian
W. Martin Borgert
-
2016/11/09
Re: Handling of "malware" in Debian
Holger Levsen
-
2016/11/09
Re: Handling of "malware" in Debian
W. Martin Borgert
-
2016/11/09
Re: Handling of "malware" in Debian
Holger Levsen
-
2016/11/09
Re: Handling of "malware" in Debian
W. Martin Borgert
-
2016/11/09
Re: Handling of "malware" in Debian
Holger Levsen
-
2016/11/09
Re: Handling of "malware" in Debian
Vladislav Kurz
-
2016/11/09
Re: Handling of "malware" in Debian
W. Martin Borgert
-
2016/11/09
Re: Handling of "malware" in Debian
Paul Wise
-
2016/11/09
Handling of "malware" in Debian
W. Martin Borgert
-
2016/11/07
Re: vulnerability in 8.6
Ozgur
-
2016/11/07
Re: vulnerability in 8.6
Eduardo M KALINOWSKI
-
2016/11/07
Re: vulnerability in 8.6
Mike Oliver
-
2016/11/07
Re: vulnerability in 8.6
Andrew Deck
-
2016/11/07
Re: vulnerability in 8.6
Eduardo M KALINOWSKI
-
2016/11/07
Re: vulnerability in 8.6
Matias Mucciolo
-
2016/11/07
Re: vulnerability in 8.6
Ozgur
-
2016/11/07
Re: vulnerability in 8.6
Matias Mucciolo
-
2016/11/07
Re: vulnerability in 8.6
Nicholas Luedtke
-
2016/11/07
Re: vulnerability in 8.6
Ozgur
-
2016/11/07
Re: vulnerability in 8.6
Richard van den Berg
-
2016/11/07
Re: vulnerability in 8.6
Salvatore Bonaccorso
-
2016/11/07
vulnerability in 8.6
Ozgur
-
2016/11/06
Re: Userdata stays in RAM after Logout and Relogin
H. N.
-
2016/11/05
Re: Userdata stays in RAM after Logout and Relogin
Gunnar Wolf
-
2016/11/04
Re: Userdata stays in RAM after Logout and Relogin
H. N.
-
2016/11/04
Re: Userdata stays in RAM after Logout and Relogin
Felix Knecht
-
2016/11/04
RE: Userdata stays in RAM after Logout and Relogin
Radzykewycz, T (Radzy)
-
2016/11/04
Urgent Credit Notice !
Us Debt Admin.
-
2016/11/04
Re: Userdata stays in RAM after Logout and Relogin
herve
-
2016/11/04
Userdata stays in RAM after Logout and Relogin
H. N.
-
2016/11/02
Novell Users list
Cheryl Walker
-
2016/10/19
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Henrique de Moraes Holschuh
-
2016/10/19
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Alexander Schreiber
-
2016/10/19
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Henrique de Moraes Holschuh
-
2016/10/18
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Florian Weimer
-
2016/10/13
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Michael Stone
-
2016/10/13
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
2016/10/13
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
2016/10/12
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Moritz Muehlenhoff
-
2016/10/12
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Michael Stone
-
2016/10/12
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
2016/10/11
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Moritz Muehlenhoff
-
2016/10/11
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
2016/10/11
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Moritz Mühlenhoff
-
2016/10/11
Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
2016/10/10
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2949-1 [email protected] http://www.debian.org/security/ Salvatore Bonaccorso June 05, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : linux CVE ID : CVE-2014-3144 CVE-2014-3145 CVE-2014-3153 Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation: CVE-2014-3144 / CVE-2014-3145 A local user can cause a denial of service (system crash) via crafted BPF instructions. CVE-2014-3153 Pinkie Pie discovered an issue in the futex subsystem that allows a local user to gain ring 0 control via the futex syscall. An unprivileged user could use this flaw to crash the kernel (resulting in denial of service) or for privilege escalation. For the stable distribution (wheezy), these problems have been fixed in version 3.2.57-3+deb7u2. For the unstable
maher abidi
-
2016/10/08
Re: timing of PHP 5.6 security updates
tmc
-
2016/10/08
Re: timing of PHP 5.6 security updates
Salvatore Bonaccorso
-
2016/10/07
Helping Debian Lists Address S*P*A*M (Was: Activate your GlobalTestMarket membership)
Cindy-Sue Causey
-
2016/10/06
Sap BI Users Clients List
Juila Adderson
-
2016/10/06
Remate de 114 Camiones y 30 Gandolas + Maquinaria y Equipos
Departamento Venta de Equipos
-
2016/10/05
Re: timing of PHP 5.6 security updates
tmc
-
2016/10/05
Re: timing of PHP 5.6 security updates
Salvatore Bonaccorso
-
2016/10/05
timing of PHP 5.6 security updates
tmc
-
2016/10/05
Re: CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem
Salvatore Bonaccorso
-
2016/10/05
Re: CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem
Jan Lühr
-
2016/10/04
Re: CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem
Salvatore Bonaccorso
-
2016/10/04
Re: CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem
Jan Lühr
-
2016/10/04
Re: CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem
Nicholas Luedtke
-
2016/10/04
Re: CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem
Felix Knecht
-
2016/10/04
CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem
Jan Lühr
-
2016/10/03
Re: Robustify manager_dispatch_notify_fd()
Wolfgang Karall
-
2016/10/03
Re: Bug#839607: Robustify manager_dispatch_notify_fd()
Florian Weimer
-
2016/10/03
Re: Bug#839607: Robustify manager_dispatch_notify_fd()
Salvatore Bonaccorso
-
2016/10/03
Re: Bug#839607: Robustify manager_dispatch_notify_fd()
Florian Weimer
-
2016/10/03
Re: Bug#839607: Robustify manager_dispatch_notify_fd()
Michael Biebl
-
2016/10/03
Re: Bug#839607: Robustify manager_dispatch_notify_fd()
Michael Biebl
-
2016/10/03
Re: Robustify manager_dispatch_notify_fd()
Michael Biebl
-
2016/10/02
Re: Robustify manager_dispatch_notify_fd()
Wolfgang Karall
-
2016/10/02
Re: Robustify manager_dispatch_notify_fd()
Michael Biebl
-
2016/10/02
Bug#839607: Robustify manager_dispatch_notify_fd()
Michael Biebl
-
2016/10/02
Re: Activate your GlobalTestMarket membership
Paul Wise
-
2016/09/27
Re: Security features in the upcoming release (Stretch)
Russell Coker
-
2016/09/24
Re: Security features in the upcoming release (Stretch)
Richard Owlett
-
2016/09/23
Re: Security features in the upcoming release (Stretch)
Darko Gavrilovic