833円!!あの有名女優の....
http://www.uradvdfun.com 激安!!あの有名女優の無修正DVDが一枚833円!! 高品質!!高画質!!秘密厳守!! 局留め、フリメOK即日発送ですぐにお手元に 絶対に後悔はさせません (引きこもりに注意) 広告代理店「有限会社アストロ」 [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Apache 1.3 also vulnerable?
Processing commands for [EMAIL PROTECTED]: clone 316173 -1 Bug#316173: SECURITY: HTTP proxy responses with both Transfer-Encoding and Content-Length headers (CAN-2005-2088) Bug 316173 cloned as bug 322607. clone 320048 -2 Bug#320048: SECURITY: buffer-overrun in apache2-ssl (CAN-2005-1268) Bug is marked as being merged with others. reassign -1 apache Bug#322607: SECURITY: HTTP proxy responses with both Transfer-Encoding and Content-Length headers (CAN-2005-2088) Bug reassigned from package `apache2' to `apache'. reassign -2 apache Bug number -2 not found. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?
Package: apache2 Severity: grave Tags: security Hello Apache maintainers, please check if Debian is vulnerable to CAN-2005-1344 and make sure it enters http://www.debian.org/security/crossreferences or the not-vulnerable lists. http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1344 Buffer overflow in htdigest in Apache 2.0.52 may allow attackers to execute arbitrary code via a long realm argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability. thanks, -christian- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#322613: Processed: Apache 1.3 also vulnerable?
Package: apache Severity: critical Tags: security thanks Cloning did not work, so I open a new bug report. Reason was that RedHat/Fedora also updated their 1.3.27 packages so this version might also be vulnerable. clone 320048 -2 Bug#320048: SECURITY: buffer-overrun in apache2-ssl (CAN-2005-1268) Bug is marked as being merged with others. reassign -2 apache Bug number -2 not found. bye, -christian- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?
Processing commands for [EMAIL PROTECTED]: notfound 322604 2.0.54-3 Bug#322604: SECURITY: Vulnerable to CAN-2005-1344? Bug marked as not found in version 2.0.54-3. merge 307134 322604 Bug number 307134 not found. thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#322604: SECURITY: Vulnerable to CAN-2005-1344?
notfound 322604 2.0.54-3 merge 307134 322604 thanks Christian Hammers wrote: Hello Apache maintainers, please check if Debian is vulnerable to CAN-2005-1344 and make sure it enters http://www.debian.org/security/crossreferences or the not-vulnerable lists. You can find a note that this bug was fixed in the changelog for apache2 (2.0.54-3), as well as in the testing security teams's database. Bug #307134 was previously filed for that. It might be wise to at least check the changelog before filing grave bug reports in the future. So this hole was not present in the stable release and thus the stable security team will never issue a DSA for it (apache2 is not in oldstable), and so it will never appear on the Debian website. -- see shy jo signature.asc Description: Digital signature
Processed: closing 322604
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.4 close 322604 2.0.54-3 Bug#322604: SECURITY: Vulnerable to CAN-2005-1344? 'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing. Bug marked as fixed in version 2.0.54-3, send any further explanations to Christian Hammers [EMAIL PROTECTED] End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]