On Sat, Jun 19, 2004 at 11:46:37AM +0200, Bernhard Kuemel wrote:
> Matt Zimmerman wrote:
>
> >Package: super
> >Vulnerability : format string
> >Problem-Type : remote
>
> >Max Vozeler discovered a format string vulnerability in super, a
> >program to allow specified users to execute c
On Sat, Jun 19, 2004 at 11:46:37AM +0200, Bernhard Kuemel wrote:
> Matt Zimmerman wrote:
>
> >Package: super
> >Vulnerability : format string
> >Problem-Type : remote
>
> >Max Vozeler discovered a format string vulnerability in super, a
> >program to allow specified users to execute c
On Tue, 15 Jun 2004 (10:46), Alberto Gonzalez Iniesta wrote:
> autocmd BufReadPre,FileReadPre *.gpg,*.asc set viminfo=
> autocmd BufReadPre,FileReadPre *.gpg,*.asc set noswapfile
These auto-commands are very interesting... But there is an error:
BufReadPre is _not_ e
Hi Matt!
Matt Zimmerman wrote:
Package: super
Vulnerability : format string
Problem-Type : remote
Max Vozeler discovered a format string vulnerability in super, a
program to allow specified users to execute commands with root
privileges. This vulnerability could potentially be ex
On Tue, 15 Jun 2004 (10:46), Alberto Gonzalez Iniesta wrote:
> autocmd BufReadPre,FileReadPre *.gpg,*.asc set viminfo=
> autocmd BufReadPre,FileReadPre *.gpg,*.asc set noswapfile
These auto-commands are very interesting... But there is an error:
BufReadPre is _not_ e
Hi Matt!
Matt Zimmerman wrote:
Package: super
Vulnerability : format string
Problem-Type : remote
Max Vozeler discovered a format string vulnerability in super, a
program to allow specified users to execute commands with root
privileges. This vulnerability could potentially be exploite
No permission to create tickets in the queue 'accounts'
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 521-1 [EMAIL PROTECTED]
http://www.debian.org/security/
7 matches
Mail list logo