debian-security
Thread
Date
Earlier messages
Later messages
Messages by Thread
Re: HTTPS enabled Debian Security repository
Paul Wise
Re: HTTPS enabled Debian Security repository
Marek Sebera
Re: HTTPS enabled Debian Security repository
Paul Wise
Re: HTTPS enabled Debian Security repository
Paul Wise
Re: HTTPS enabled Debian Security repository
Tototechy
Re: [SECURITY] [DSA 3995-1] libxfont security update
Adrian Bunk
Re: [SECURITY] [DSA 3995-1] libxfont security update
Julien Cristau
Re: [SECURITY] [DSA 3995-1] libxfont security update
Adrian Bunk
Upcoming stable point release (9.2)
Jonathan Wiltshire
Re: Upcoming stable point release (9.2)
Adam D. Barratt
Re: [Announce] Samba 4.6.8, 4.5.14 and 4.4.16 Security Releases Available
Mathieu Parent
Availability of blueborne kernel fix ?
Julien Aubin
Re: [DSA 3970-1] emacs24 security update
Bjørn Mork
Re: [DSA 3970-1] emacs24 security update
Salvatore Bonaccorso
Different MD5 from same kernel module tun.ko on different servers same distro
x9p
Re: Different MD5 from same kernel module tun.ko on different servers same distro
Paul Wise
Re: Different MD5 from same kernel module tun.ko on different servers same distro
x9p
gnupg upload for CVE-2017-7526
Guido Günther
Re: gnupg upload for CVE-2017-7526
Noah Meyerhans
security issues
R Calleja
[tracker] New sub-states for issues tagged no-dsa
Sébastien Delafond
Re: [tracker] New sub-states for issues tagged no-dsa
Guido Günther
Re: When did Debian decide to enable PIE by default?
慕 冬亮
latest openssh for wheezy
Adam Weremczuk
Re: latest openssh for wheezy
Salvatore Bonaccorso
Re: latest openssh for wheezy
Adam Weremczuk
Re: latest openssh for wheezy
Arto Jantunen
Re: latest openssh for wheezy
Markus Koschany
Ferm default ruleset is wide open on ipv6
Adam McKenna
Security support for chromium in jessie
Michael Gilbert
Re: Security support for chromium in jessie
Emilio Pozuelo Monfort
Re: Security support for chromium in jessie
Michael Gilbert
FreeRADIUS vulnerabilities (e.g. CVE-2017-10979)
Mirko Ahnert
Re: [SECURITY] [DSA 3909-1] samba security update
Sven Hartge
Re: [SECURITY] [DSA 3909-1] samba security update
Daniel Reichelt
Re: [SECURITY] [DSA 3909-1] samba security update
Adam D. Barratt
Upcoming stable point release (9.1)
Adam D. Barratt
Re: Upcoming stable point release (9.1)
Adam D. Barratt
Upcoming oldstable point release (8.9)
Adam D. Barratt
Re: Upcoming oldstable point release (8.9)
Adam D. Barratt
OutlawCountry: project of the CIA targets Linux
Anonymous
STIG-4-Debian for Debian "Stretch" 9
Samson
Re: STIG-4-Debian for Debian "Stretch" 9
Paul Wise
Re: STIG-4-Debian for Debian "Stretch" 9
Samson
Datacore Contacts list 2017
Emma Angel
Kernel: Fix for CVE-2017-1000364 (mm: enlarge stack guard gap) breaks java application
Stephan Seitz
Re: Kernel: Fix for CVE-2017-1000364 (mm: enlarge stack guard gap) breaks java application
Salvatore Bonaccorso
Re: Kernel: Fix for CVE-2017-1000364 (mm: enlarge stack guard gap) breaks java application
Stephan Seitz
Re: Kernel: Fix for CVE-2017-1000364 (mm: enlarge stack guard gap) breaks java application
Rene Engelhard
Re: Planned release of stretch on 2017-06-17 and the last weeks up to the release
Jonathan Wiltshire
Fortinet/Juniper Networks/Symantec Users
amber . benson
Fun job: Please test/review patch for picocom CVE-2015-9059
W. Martin Borgert
Please its for you
Afzzal Ahmed
Current LiveCDs don't include UFW!
Nomen Nescio
FYI
Dr . Shan Weijian
How To Incident Response
lann...@runbox.com
Re: How To Incident Response
Gunnar Wolf
Re: How To Incident Response
lann...@runbox.com
Fwd: Re: [scr330159] lintian - 2.5.41, not fixed yet
Niels Thykier
Re: Fwd: Re: [scr330159] lintian - 2.5.41, not fixed yet
Christoph Biedl
Re: [Pkg-rust-maintainers] Processed: bugs
Ximin Luo
bind9 CVE-2017-3137
Adrian Minta
Re: bind9 CVE-2017-3137
Salvatore Bonaccorso
Re: bind9 CVE-2017-3137
Adrian Minta
Bug#857068: Bump libgit2 version to upstream release 0.25.1
Ximin Luo
Re: [SECURITY] [DSA 3823-1] eject security update
Hideki Yamane
Re: [SECURITY] [DSA 3823-1] eject security update
Salvatore Bonaccorso
Technology/Industry Users
eva . bowman
Upcoming stable point release (8.8)
Adam D. Barratt
Re: Upcoming stable point release (8.8)
Adam D. Barratt
Re: Re: Strange file atttributes
Aldo Hernandez
Will this iptables script work as an ip6tables script?
Jiangsu Kumquat
Re: Will this iptables script work as an ip6tables script?
Gustavo Lima
Re: Will this iptables script work as an ip6tables script?
Gustavo Lima
Re: Will this iptables script work as an ip6tables script?
Thomas Kapoulas
Details on CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem
Jan Lühr
Re: Details on CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem
Salvatore Bonaccorso
Re: Details on CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem
Jan Lühr
[release-notes/stretch] Release notes sign-off from the security team
Niels Thykier
Re: [release-notes/stretch] Release notes sign-off from the security team
Florian Weimer
Re: [release-notes/stretch] Release notes sign-off from the security team
Julien Cristau
Re: [release-notes/stretch] Release notes sign-off from the security team
Florian Weimer
Re: [release-notes/stretch] Release notes sign-off from the security team
Julien Cristau
firewall
R Calleja
Iptables
R Calleja
Re: Iptables
Russell Coker
Information on Germany
Jenn Miller
Re: [SECURITY] [DSA 3817-1] jbig2dec security update
Chris Boot
ModSecurity Debian 8
lann...@runbox.com
Re: ModSecurity Debian 8
Krzysztof Kokot
Re: ModSecurity Debian 8
Richard Waterbeek
Re: ModSecurity Debian 8
Alberto Gonzalez Iniesta
Re: ModSecurity Debian 8
Casper Madsen
Re: lovely things
Valerya Valdez
Cambiá tu marquesina, lona, vinilo, corporea, obra completa y mas
Dx Corp
Unidentified subject!
Aurelien Jarno
Some Debian package upgrades are corrupting rsync "quick check" backups
Adam Warner
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Christoph Biedl
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Daniel Reichelt
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Holger Levsen
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Daniel Reichelt
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Lupe Christoph
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Jonathan Hutchins
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Santiago Vila
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Russell Coker
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Jonathan Wiltshire
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Henrik Ahlgren
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Mattia Rizzolo
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Holger Levsen
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Johannes Schauer
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Holger Levsen
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Johannes Schauer
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Chris Lamb
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Mattia Rizzolo
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Holger Levsen
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Aurelien Jarno
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Aurelien Jarno
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Holger Levsen
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Adam Warner
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Aurelien Jarno
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Aurelien Jarno
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Aurelien Jarno
Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups
Adam Warner
Re: Some Debian package upgrades are corrupting rsync "quick check" backups
Bob Weber
libapache2-mod-security2 error message
Tea Wrex
Re: libapache2-mod-security2 error message
Vincent Deffontaines
Fattura TIM linea Fissa - Gennaio 2017 - scadenza 12/01/2017
Telecom Italia-TIM
Certificate errors with security.debian.org
Tea Wrex
Re: Certificate errors with security.debian.org
Scrap
Re: Certificate errors with security.debian.org
Lupe Christoph
Re: Certificate errors with security.debian.org
Paul Wise
/init/main.c issue
Sticky Chocolate
Re: /init/main.c issue
Povl Ole Haarlev Olsen
Upcoming stable point release (8.7)
Adam D. Barratt
Re: Upcoming stable point release (8.7)
Adam D. Barratt
Call for testing: upcoming squid3 security update
Salvatore Bonaccorso
embedding openssl source in sslcan
Sebastian Andrzej Siewior
Re: embedding openssl source in sslcan
Moritz Mühlenhoff
Re: embedding openssl source in sslcan
Jonathan Yu
Re: embedding openssl source in sslcan
Hans-Christoph Steiner
Re: embedding openssl source in sslcan
Thijs Kinkhorst
Re: embedding openssl source in sslcan
Christian Seiler
HTTPS needs to be implemented for updating
gwmfms06
Re: HTTPS needs to be implemented for updating
Christoph Moench-Tegeder
Re: HTTPS needs to be implemented for updating
datanoise
Re: HTTPS needs to be implemented for updating
Casper Thomsen
Re: HTTPS needs to be implemented for updating
Christoph Biedl
Re: HTTPS needs to be implemented for updating
Joerg Jaspert
Re: HTTPS needs to be implemented for updating
Marc Haber
Re: HTTPS needs to be implemented for updating
Christoph Biedl
Re: HTTPS needs to be implemented for updating
Peter Lawler
Re: HTTPS needs to be implemented for updating
Hans-Christoph Steiner
Re: HTTPS needs to be implemented for updating
Hans-Christoph Steiner
Re: HTTPS needs to be implemented for updating
Sven Hartge
Re: HTTPS needs to be implemented for updating
Martin Zobel-Helas
not getting compromised while applying apt-get upgrade for CVE-2016-1252
Patrick Schleizer
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
SZÉPE Viktor
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Geert Stappers
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Patrick Schleizer
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
SZÉPE Viktor
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Paul Wise
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Julian Andres Klode
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Patrick Schleizer
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Julian Andres Klode
Re: [qubes-devel] Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Marek Marczykowski-Górecki
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
David Kalnischkies
Re: [qubes-devel] Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Marek Marczykowski-Górecki
Re: [qubes-devel] Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Adam D. Barratt
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Patrick Schleizer
Re: [qubes-devel] Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Chris Laprise
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Hans-Christoph Steiner
Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252
Henrique de Moraes Holschuh
Call for testing: upcoming xen security update
Salvatore Bonaccorso
Nortel/Shoretel Users List
amanda palmer
Re: [SECURITY] [DSA 3726-1] imagemagick security update
Luciano Bello
DSA-3721-1 tomcat7 -- security update
Aser Casas
Re: DSA-3721-1 tomcat7 -- security update
Salvatore Bonaccorso
Re: DSA-3721-1 tomcat7 -- security update
Emmanuel Bourg
Wheezy -- Dirty Cow
praeponiertesNichts
Re: Wheezy -- Dirty Cow
Corvin Mcpherson
8th annual Competitive Game: From the Earth to the Moon
SCM SA
DSA-3708-1 mat -- security update (What are MAT users to do)?
gwmfms06
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
Andrew Deck
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
intrigeri
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
Robert Haist
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
intrigeri
Re: DSA-3708-1 mat -- security update (What are MAT users to do)?
Stephen Dowdy
Handling of "malware" in Debian
W. Martin Borgert
Re: Handling of "malware" in Debian
Paul Wise
Re: Handling of "malware" in Debian
W. Martin Borgert
Re: Handling of "malware" in Debian
Holger Levsen
Re: Handling of "malware" in Debian
W. Martin Borgert
Re: Handling of "malware" in Debian
Holger Levsen
Re: Handling of "malware" in Debian
W. Martin Borgert
Re: Handling of "malware" in Debian
Holger Levsen
Re: Handling of "malware" in Debian
W. Martin Borgert
Re: Handling of "malware" in Debian
Jonathan Wiltshire
Re: [Pkg-mozext-maintainers] Handling of "malware" in Debian
Ximin Luo
Re: [Pkg-mozext-maintainers] Handling of "malware" in Debian
W. Martin Borgert
Re: [Pkg-mozext-maintainers] Handling of "malware" in Debian
Ximin Luo
Earlier messages
Later messages