Hello,
is it correct that apache and postgresql are still waiting for
a DSA fix?
see:
postgresql #155419 and #163311
apache #163228
thx.
--
Noèl Köthe
Hello,
is it correct that apache and postgresql are still waiting for
a DSA fix?
see:
postgresql #155419 and #163311
apache #163228
thx.
--
Noèl Köthe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hello,
FYI:
http://docs.freebsd.org/cgi/getmsg.cgi?fetch=394609+0+current/freebsd-security
--
Noèl Köthe
On Don, 20 Jun 2002, Bernhard Reiter wrote:
Hello,
> Given the importance of the problem I thought I'd ask
> how long it will approximately take until these packages will be
> available from the public ftp servers?
Yesterday it was available from http://incoming.debian.org/
and moved today to th
Package: qpopper
Version: N/A; reported 2002-04-23
Severity: grave
Tags: security
Hello,
the new upstream version 4.04 from qpopper fixes a DoS.
Please update the package.
More infos about the problem:
http://online.securityfocus.com/bid/4295
ftp://ftp.qualcomm.com/eudora/servers/unix/popper/C
Package: qpopper
Version: N/A; reported 2002-04-23
Severity: grave
Tags: security
Hello,
the new upstream version 4.04 from qpopper fixes a DoS.
Please update the package.
More infos about the problem:
http://online.securityfocus.com/bid/4295
ftp://ftp.qualcomm.com/eudora/servers/unix/popper/
Package: php4
Version: N/A; reported 2002-02-27
Severity: grave
Tags: security
Justification: user security hole
http://security.e-matters.de/advisories/012002.html
"...
Unfourtunately there are several flaws in the php_mime_split function
that could be used by an attacker to execute arbitrary co
Package: php4
Version: N/A; reported 2002-02-27
Severity: grave
Tags: security
Justification: user security hole
http://security.e-matters.de/advisories/012002.html
"...
Unfourtunately there are several flaws in the php_mime_split function
that could be used by an attacker to execute arbitrary c
On Don, 07 Feb 2002, Dmitry N. Hramtsov wrote:
> As I can see this bug already fixed (Status: Closed) in PHP:
> http://bugs.php.net/bug.php?id=15375,
> so we should just wait for updated package from maintainer.
Maybe its a good idea to read the bug and why it is closed:
--8<--
[5 Feb 9:53am] [E
On Don, 07 Feb 2002, Dmitry N. Hramtsov wrote:
> As I can see this bug already fixed (Status: Closed) in PHP:
> http://bugs.php.net/bug.php?id=15375,
> so we should just wait for updated package from maintainer.
Maybe its a good idea to read the bug and why it is closed:
--8<--
[5 Feb 9:53am] [
Package: libgtop-daemon
Version: 1.0.12-2
Severity: grave
Justification: user security hole
Tags: security
Hello,
I found this problem about my (since 1 week:)) package libgtop
http://www.securityfocus.com/bid/3586 :
"GNOME libgtop_daemon Remote Format String Vulnerability
The GNOME libgtop_daem
Package: libgtop-daemon
Version: 1.0.12-2
Severity: grave
Justification: user security hole
Tags: security
Hello,
I found this problem about my (since 1 week:)) package libgtop
http://www.securityfocus.com/bid/3586 :
"GNOME libgtop_daemon Remote Format String Vulnerability
The GNOME libgtop_dae
12 matches
Mail list logo