On Thu, Aug 05, 2004 at 02:10:14PM -0400, Kevin B. McCarty wrote:
Have you guys seen this advisory yet? It looks rather serious:
http://isec.pl/vulnerabilities/isec-0016-procleaks.txt
Apparently this is fixed in 2.4.27-rc5 (don't know about 2.6 series):
http://lwn.net/Articles/96485/
The
Hello,
When doing the usual apt-get upgrade on the security sources.list,
these packets want to be installed:
33ebccfeda79653d305c2ebc5416b331 php4-imap_4%3a4.1.2-7.0.1_i386.deb
3b6588b6fa8f873b9a7e49c1fcbb0c72 php4_4%3a4.1.2-7.0.1_i386.deb
(both with mtime july 22th)
Whereas in this
On Tue, 10 Aug 2004 at 05:51:19PM -0400, Rick Moen wrote:
Quoting Ian Beckwith ([EMAIL PROTECTED]):
Do you have links to documentation of these issues or where to get the
pirated versions? How pirated/illegal are they?
License permitting, I could maybe take patches from them.
On Tue, Aug 10, 2004 at 10:12:06AM -0700, Josh Martin wrote:
-- no debconf information
Although this should never actually happen, if you set your environment
variable HOME to an extremely large string a buffer overflow will occur upon
connecting to a server using telnet.
Urgh.. This really
I have several hundred debian instances to care for, and they are
monitored via Nagios. I would like to institute a regular test that
checks each box against a list of security advisories, without
running apt-get update several times a day on 300 boxes.
Therefore I see a need for a machine
On Thursday, 2004-08-12 at 14:26:44 +1000, Joshua Goodall wrote:
Therefore I see a need for a machine readable DSA format. I know there's
a defined format to the current header, but I'd like to expand on that.
It will look something like:
Please do not invent yet anoither format if you can
6 matches
Mail list logo