Messages by Thread
-
Details on CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem
Jan Lühr
-
[release-notes/stretch] Release notes sign-off from the security team
Niels Thykier
-
firewall
R Calleja
-
Iptables
R Calleja
-
Information on Germany
Jenn Miller
-
Re: [SECURITY] [DSA 3817-1] jbig2dec security update
Chris Boot
-
ModSecurity Debian 8
lann...@runbox.com
-
Re: lovely things
Valerya Valdez
-
Cambiá tu marquesina, lona, vinilo, corporea, obra completa y mas
Dx Corp
-
Unidentified subject!
Aurelien Jarno
-
Some Debian package upgrades are corrupting rsync "quick check" backups
Adam Warner
-
libapache2-mod-security2 error message
Tea Wrex
-
Fattura TIM linea Fissa - Gennaio 2017 - scadenza 12/01/2017
Telecom Italia-TIM
-
Certificate errors with security.debian.org
Tea Wrex
-
/init/main.c issue
Sticky Chocolate
-
Upcoming stable point release (8.7)
Adam D. Barratt
-
Call for testing: upcoming squid3 security update
Salvatore Bonaccorso
-
embedding openssl source in sslcan
Sebastian Andrzej Siewior
-
HTTPS needs to be implemented for updating
gwmfms06
-
not getting compromised while applying apt-get upgrade for CVE-2016-1252
Patrick Schleizer
-
Call for testing: upcoming xen security update
Salvatore Bonaccorso
-
Nortel/Shoretel Users List
amanda palmer
-
Re: [SECURITY] [DSA 3726-1] imagemagick security update
Luciano Bello
-
DSA-3721-1 tomcat7 -- security update
Aser Casas
-
Wheezy -- Dirty Cow
praeponiertesNichts
-
8th annual Competitive Game: From the Earth to the Moon
SCM SA
-
DSA-3708-1 mat -- security update (What are MAT users to do)?
gwmfms06
-
Handling of "malware" in Debian
W. Martin Borgert
-
vulnerability in 8.6
Ozgur
-
Urgent Credit Notice !
Us Debt Admin.
-
Userdata stays in RAM after Logout and Relogin
H. N.
-
Novell Users list
Cheryl Walker
-
Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Moritz Mühlenhoff
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Moritz Muehlenhoff
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Michael Stone
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Michael Stone
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Florian Weimer
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Henrique de Moraes Holschuh
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Alexander Schreiber
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Henrique de Moraes Holschuh
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
Moritz Muehlenhoff
-
Re: Vulnerabilities rated medium or low risk may not be fixed by Debian security team, is that correct?
te3d4q
-
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2949-1 secur...@debian.org http://www.debian.org/security/ Salvatore Bonaccorso June 05, 2014 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : linux CVE ID : CVE-2014-3144 CVE-2014-3145 CVE-2014-3153 Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation: CVE-2014-3144 / CVE-2014-3145 A local user can cause a denial of service (system crash) via crafted BPF instructions. CVE-2014-3153 Pinkie Pie discovered an issue in the futex subsystem that allows a local user to gain ring 0 control via the futex syscall. An unprivileged user could use this flaw to crash the kernel (resulting in denial of service) or for privilege escalation. For the stable distribution (wheezy), these problems have been fixed in version 3.2.57-3+deb7u2. For the unstable
maher abidi
-
Helping Debian Lists Address S*P*A*M (Was: Activate your GlobalTestMarket membership)
Cindy-Sue Causey
-
Sap BI Users Clients List
Juila Adderson
-
Remate de 114 Camiones y 30 Gandolas + Maquinaria y Equipos
Departamento Venta de Equipos
-
timing of PHP 5.6 security updates
tmc
-
CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem
Jan Lühr
-
Bug#839607: Robustify manager_dispatch_notify_fd()
Michael Biebl
-
Re: Activate your GlobalTestMarket membership
Paul Wise
-
Security features in the upcoming release (Stretch)
m.la...@t-online.de