Juan Gallego wrote:
> is sarge affected by this vulnerability? or has sarge been archived and i
> missed the announcement?
The main attack vector - pygrub/xen - doesn't exist in Sarge. The other attacks
are more or less theoretical and hardly justify modifications to an important
core package lik
Hi Steve,
* Steve Kemp <[EMAIL PROTECTED]> [2007-12-07 20:26]:
> On Fri Dec 07, 2007 at 18:41:35 +0100, Nico Golde wrote:
> > What about those, are they unimportant?
> > They are still present in the etch code. I stumbled
> > upon them while preparing a testing-security upload.
>
> Uknown. I us
Hi Steve,
* Steve Kemp <[EMAIL PROTECTED]> [2007-12-07 20:26]:
> On Fri Dec 07, 2007 at 18:41:35 +0100, Nico Golde wrote:
>
> > What about those, are they unimportant?
> > They are still present in the etch code. I stumbled
> > upon them while preparing a testing-security upload.
>
> Uknown. I
On Fri Dec 07, 2007 at 18:41:35 +0100, Nico Golde wrote:
> What about those, are they unimportant?
> They are still present in the etch code. I stumbled
> upon them while preparing a testing-security upload.
Uknown. I used the patch provided by Theodore Tso, which he
is/was planning on using
Hi,
* Nico Golde <[EMAIL PROTECTED]> [2007-12-07 18:32]:
[...]
> > Rafal Wojtczuk of McAfee AVERT Research discovered that e2fsprogs,
> > ext2 file system utilities and libraries, contained multiple
> > integer overflows in memory allocations, based on sizes taken directly
> > from filesystem info
Hi Steve,
* Steve Kemp <[EMAIL PROTECTED]> [2007-12-07 14:32]:
>
> Debian Security Advisory DSA-1422[EMAIL PROTECTED]
> http://www.debian.org/security/ Steve Kemp
> December 07
On Fri Dec 07, 2007 at 09:46:21 -0500, Juan Gallego wrote:
> | For the stable distribution (etch), this problem has been fixed in version
> | 1.39+1.40-WIP-2006.11.14+dfsg-2etch1.
>
> | For the unstable distribution (sid), this problem will be fixed shortly.
> is sarge affected by this vulnerabi
On 2007-12-07 13:21-, Steve Kemp <[EMAIL PROTECTED]> wrote:
| For the stable distribution (etch), this problem has been fixed in version
| 1.39+1.40-WIP-2006.11.14+dfsg-2etch1.
| For the unstable distribution (sid), this problem will be fixed shortly.
hi Steve and others,
is sarge affected
8 matches
Mail list logo