New GLSA request filed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1110273
Title:
[Security] Vulnerability on UPnP, need an update to libupnp 1.6.18
To manage notifications about this bug go
Thanks, Hanno and Bjarke.
Arches, please test and mark stable:
=net-libs/libupnp-1.6.18
Target KEYWORDS: alpha amd64 arm hppa ppc ppc64 sparc x86
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1110273
Thanks, everyone.
GLSA vote: yes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1039881
Title:
inn-2.5.3 - plaintext command injection during the negotiation of a
TLS layer
To manage
Thanks, everyone.
GLSA vote: no.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1036509
Title:
fetchmail-SA-2012-02: DoS possible with NTLM authentication in debug
mode
To manage notifications
Thanks, everyone.
Already on an existing GLSA request.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1011823
Title:
mantisbt : multiple vulnerabilities
To manage notifications about this bug go
GLSA vote: no.
Closing noglsa.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to puppet in Ubuntu.
https://bugs.launchpad.net/bugs/1023931
Title:
(CVE-2012-3864) puppet: multiple vulnerabilities for 2.7.17 and
earlier releases
(In reply to comment #9)
Continued in bug #433990.
Until an updated ebuild fixing bug #433990 is provided for
stabilization, PPC/PPC64 should continue here.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Thanks, everyone.
Filing a new GLSA request.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1022012
Title:
(CVE-2012-3374) pidgin-2.10.5: MXit buffer overflow
To manage notifications about this
GLSA vote: no.
Closing noglsa.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1023931
Title:
(CVE-2012-3864) puppet: multiple vulnerabilities for 2.7.17 and
earlier releases
Thanks, everyone.
GLSA vote: no.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/894782
Title:
Newline injection in error.log
To manage notifications about this bug go to:
Arches, please test and mark stable =www-apps/mantisbt-1.2.11
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1011823
Title:
mantisbt : multiple vulnerabilities
To manage notifications about this
(In reply to comment #5)
Peter, David, web-apps: may we stabilize 1.2.11?
ping?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1011823
Title:
mantisbt : multiple vulnerabilities
To manage
GLSA vote: yes.
GLSA request filed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1039560
Title:
tor-0.2.2.38 : Multiple vulnerabilites
To manage notifications about this bug go to:
(In reply to comment #1)
6.3.22 added to CVS.
Thanks, Tim. May we proceed with stabilization?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1036509
Title:
fetchmail-SA-2012-02: DoS possible with
(In reply to comment #5)
2.3.3 now in portage. I can only do a limited testing on my webserver so
please give it a try (or please ATs, test as much as you can) before marking
it stable.
Thanks, Markos.
Arches, please test and mark stable:
=net-misc/icecast-2.3.3
Target KEYWORDS: alpha amd64
(In reply to comment #3)
sorry for delay.
2.7.18 in cvs. please mark stable 2.7.18.
Thanks.
Arches, please test and mark stable:
=app-admin/puppet-2.7.18
Target Keywords: amd64 hppa ppc sparc x86
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
Thanks, everyone. GLSA draft is ready and needs 1 more approval.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1025111
Title:
(CVE-2012-2842) chromium-browser-20.0.1132.57 : use-after-free
(In reply to comment #3)
sorry for delay.
2.7.18 in cvs. please mark stable 2.7.18.
Thanks.
Arches, please test and mark stable:
=app-admin/puppet-2.7.18
Target Keywords: amd64 hppa ppc sparc x86
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Thanks, everyone.
GLSA vote: yes.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to asterisk in Ubuntu.
https://bugs.launchpad.net/bugs/1022360
Title:
(CVE-2012-3812) CVE-2012-3812 asterisk: Remote crash vulnerability in
voice mail
Thanks, everyone.
GLSA vote: yes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1022360
Title:
(CVE-2012-3812) CVE-2012-3812 asterisk: Remote crash vulnerability in
voice mail application
Thanks for the report, Andrzej.
@net-im, may we proceed to stabilize =net-im/pidgin-2.10.6 ?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1022012
Title:
(CVE-2012-3374) pidgin-2.10.5: MXit buffer
21 matches
Mail list logo