Unsuscribe

2018-12-15 Thread Fco. Moyano

Mit freudlichen Grüßen.

Herr Moyano


Re: Unsuscribe

2017-11-01 Thread SZÉPE Viktor

Specially made for unsubscribers: https://www.youtube.com/watch?v=LRT0Vt71v-c


Idézem/Quoting Jiadong Wang :


unsubscribe

On Wed, Nov 1, 2017 at 9:42 AM, Povl Ole Haarlev Olsen <
debian-secur...@stderr.dk> wrote:


On Wed, 1 Nov 2017, Daniel Hadfield wrote:


You need to use the web form:
https://www.debian.org/MailingLists/unsubscribe



Or send an email:

List-Unsubscribe:


NOTE: ...-request@... !

--
Povl Ole





--
Jiadong Wang
Harold S. Mohler Laboratory
Lehigh University
200 West Packer Avenue
Bethlehem, PA 18015-1582

Phone No: 484-707-8895




SZÉPE Viktor, honlap üzemeltetés
https://github.com/szepeviktor/debian-server-tools/blob/master/CV.md
--
+36-20-4242498  s...@szepe.net  skype: szepe.viktor
Budapest, III. kerület






Re: Unsuscribe

2017-11-01 Thread Vaughn Graham
misguidedRequest

On Wed, Nov 1, 2017 at 10:34 AM, Jiadong Wang  wrote:

> unsubscribe
>
> On Wed, Nov 1, 2017 at 9:42 AM, Povl Ole Haarlev Olsen <
> debian-secur...@stderr.dk> wrote:
>
>> On Wed, 1 Nov 2017, Daniel Hadfield wrote:
>>
>>> You need to use the web form:
>>> https://www.debian.org/MailingLists/unsubscribe
>>>
>>
>> Or send an email:
>>
>> List-Unsubscribe:
>> 
>>
>> NOTE: ...-request@... !
>>
>> --
>> Povl Ole
>>
>>
>
>
> --
> Jiadong Wang
> Harold S. Mohler Laboratory
> Lehigh University
> 200 West Packer Avenue
> 
> Bethlehem, PA 18015
> 
> -1582
>
> Phone No: 484-707-8895 <(484)%20707-8895>
>



-- 
-
*Vaughn Graham*
*Director of E-Innovations*
Domino Management Services LLC.
Ext: 19907 l.ed/19907


Re: Unsuscribe

2017-11-01 Thread Jiadong Wang
unsubscribe

On Wed, Nov 1, 2017 at 9:42 AM, Povl Ole Haarlev Olsen <
debian-secur...@stderr.dk> wrote:

> On Wed, 1 Nov 2017, Daniel Hadfield wrote:
>
>> You need to use the web form:
>> https://www.debian.org/MailingLists/unsubscribe
>>
>
> Or send an email:
>
> List-Unsubscribe:
> 
>
> NOTE: ...-request@... !
>
> --
> Povl Ole
>
>


-- 
Jiadong Wang
Harold S. Mohler Laboratory
Lehigh University
200 West Packer Avenue
Bethlehem, PA 18015-1582

Phone No: 484-707-8895


Re: Unsuscribe

2017-11-01 Thread Povl Ole Haarlev Olsen

On Wed, 1 Nov 2017, Daniel Hadfield wrote:

You need to use the web form:
https://www.debian.org/MailingLists/unsubscribe


Or send an email:

List-Unsubscribe:


NOTE: ...-request@... !

--
Povl Ole



Re: Unsuscribe

2017-11-01 Thread Daniel Hadfield

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

You need to use the web form:
https://www.debian.org/MailingLists/unsubscribe


On 01/11/17 13:55, Donald Haley wrote:
> Please unsuscribe me. > > Thanks
-BEGIN PGP SIGNATURE-

iQFIBAEBCgAyFiEErEVwVy+FOWKYCpbdrygR60hkMfgFAln53I0UHGRhbkBwaW5n
c3dlZXAuY28udWsACgkQrygR60hkMfiayQgAnKlYPiciiBRUwIerA4uM9fYEDEHS
ql4gwN8IsZpL2d9ArT5XW5sAmLrDK75P62P8SY9stiA1H82W+rOMAg0FNfMowd2m
T8O4RM++jjWEnF74FZHpESTZTCY9M62imCBZ3fnO+a2Ce49v0zFH/eC2AdIE1Vq7
1U6YNGp6nBJdGMtvnuv0voh6jmlOLia1uwpA6iB0D8HvcOsm7rY+6+22l9kAbjtc
+hkqD04QMvGEZxRlJB0QdzOZFZpXnukKq8Jyjkx+6lMuitep+MCE7hLrIUlKr4zV
K/vUc56Zbppk8IoJjjOHboCt9fvBuoCreLRiImBy1Cnnm1Y4m2Tucg3juw==
=ILyQ
-END PGP SIGNATURE-



Re: Unsuscribe

2017-11-01 Thread mysystemp
https://imgflip.com/i/1ym0x0

2017-11-01 14:56 GMT+01:00 Donald Haley <deha...@centurylink.net>:

> Please unsuscribe me.
>
> Thanks
>


Unsuscribe

2017-11-01 Thread Donald Haley
Please unsuscribe me. 

Thanks 


Unsuscribe

2017-11-01 Thread Donald Haley
Please unsuscribe me. 

Thanks 


Re: Unsuscribe

2017-10-31 Thread Paulo Deolindo
Unsubscribe.


--
Atenciosamente,

Paulo Roberto Deolindo Junior
Analista de Operações - Suporte - Digot
Tel.: 55 (21) 2442-9509

BB Tecnologia e Serviços
www.bbtecno.com.br<http://www.bbtecno.com.br>


De: William TOUZALIN <axlsw...@hotmail.com>
Enviado: terça-feira, 31 de outubro de 2017 12:09:09
Para: Laurent Cordier
Cc: debian-security@lists.debian.org
Assunto: Re: Unsuscribe

À un B près: ça passait !
(ou pas)

Will-From-Tokyo


> On 2017/10/31, at 21:47, Laurent Cordier <lcord...@gmx.com> wrote:
>
>
> --
> Laurent Cordier
> Administrateur Systèmes
> 06.71.96.39.24
> 1, rue guilbert
> 14000 CAEN
>
Esta mensagem pode conter informação confidencial e/ou privilegiada, sendo seu 
sigilo protegido por lei. Se você não for o destinatário ou a pessoa autorizada 
a receber esta mensagem, não pode usar, copiar ou divulgar as informações nela 
contidas ou tomar qualquer ação baseada nessas informações. Se você recebeu 
esta mensagem por engano, por favor, avise imediatamente ao remetente, 
respondendo o e-mail e em seguida apague-a. Agradecemos sua cooperação. This 
message may contain confidential and/or privileged information and its 
confidentiality protected by law. If you are not the address or authorized to 
receive this for the address, you must not use, copy, disclose or take any 
action based on this message or any information here in. If you have received 
this message in error, please advise the sender immediately by reply e-mail and 
delete this message. Thank you for your cooperation.


Re: Unsuscribe

2017-10-31 Thread William TOUZALIN
À un B près: ça passait !
(ou pas)

Will-From-Tokyo


> On 2017/10/31, at 21:47, Laurent Cordier  wrote:
> 
> 
> -- 
> Laurent Cordier
> Administrateur Systèmes
> 06.71.96.39.24
> 1, rue guilbert
> 14000 CAEN
> 


Unsuscribe

2017-10-31 Thread Laurent Cordier


--
Laurent Cordier
Administrateur Systèmes
06.71.96.39.24
1, rue guilbert
14000 CAEN



Re: Unsuscribe

2017-10-18 Thread Noor Christensen
On Mon, Oct 16, 2017 at 08:26:47PM -0400, Jocey Ricardo P閞ez S醤chez wrote:
> Enviado desde mi Huawei

Messages for subscribing/unsubscribing should be sent to this address:

debian-security-requ...@lists.debian.org

-- noor

|_|O|_|
|_|_|O|  Noor Christensen  
|O|O|O|  n...@fripost.org ~ 0x401DA1E0


signature.asc
Description: PGP signature


Unsuscribe

2017-10-17 Thread Jocey Ricardo P閞ez S醤chez


Enviado desde mi Huawei

Unsuscribe

2017-08-28 Thread Gustavo F. Paredes - LU2JGP
-- 

*"Per Aspera ad Astra"*
Gustavo F. Paredes Delaloye
Técnico en Computación.
Técnico Superior en Electrónica Digital y Control Automático.
Profesor para el Nivel Secundario en la Modalidad Técnico-Profesional.
Técnico Universitario en Automatización y Control de Procesos Industriales.
Matricula Nacional COPITEC T3018
My LinkedIn 
Skype: lu2jgp
lu2...@gmail.com
paredes...@copitec.org.ar
-- 



*Labalta 127Concepción del Uruguay, Entre RíosArgentina**Tel.: *+54 3442
443731
*Movil: *+54 9 3442 540623


Unsuscribe

2016-08-02 Thread Jocey Ricardo P閞ez S醤chez
Unsuscribe

Enviado desde mi Huawei

RE: remove email - unsuscribe

2016-04-14 Thread Philip Costello


Please remove my email from you system : 

nbe...@4gwireless.com 





-Original Message-
From: sebastien wey [mailto:sebastien_...@yahoo.fr] 
Sent: Thursday, April 14, 2016 8:20 AM
To: debian-security@lists.debian.org
Subject: remove email - unsuscribe

Please remove my email from you system :
sebastien_...@yahoo.fr



Re: remove email - unsuscribe

2016-04-14 Thread Franck Ridel
Hi Philip.

You can unsuscribe here :
https://www.debian.org/MailingLists/unsubscribe

Greetings

On Thu, Apr 14, 2016, 20:03 Philip Costello <pcoste...@4gwireless.com>
wrote:

>
>
> Please remove my email from you system :
>
> nbe...@4gwireless.com
>
>
>
>
>
> -Original Message-
> From: sebastien wey [mailto:sebastien_...@yahoo.fr]
> Sent: Thursday, April 14, 2016 8:20 AM
> To: debian-security@lists.debian.org
> Subject: remove email - unsuscribe
>
> Please remove my email from you system :
> sebastien_...@yahoo.fr
>
> --
Franck Ridel

http://franck-ridel.fr/
https://www.google.com/+FranckRidel


remove email - unsuscribe

2016-04-14 Thread sebastien wey
Please remove my email from you system :

sebastien_...@yahoo.fr



Re: unsuscribe

2016-01-25 Thread Vaughn Graham
https://www.debian.org/MailingLists/unsubscribe

Please see the form above to unsubscribe.

Cheers

On Sat, Jan 23, 2016 at 12:39 AM, Kopilous Kopilous 
wrote:

> Le 23 janv. 2016 07:31, "Ben Hutchings"  a écrit :
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> -
>> -
>> Debian Security Advisory DSA-3452-1   secur...@debian.org
>> https://www.debian.org/security/Ben Hutchings
>> January 23, 2016  https://www.debian.org/security/faq
>> -
>> -
>>
>> Package: claws-mail
>> CVE ID : CVE-2015-8614
>>
>> "DrWhax" of the Tails project reported that Claws Mail is missing
>> range checks in some text conversion functions.  A remote attacker
>> could exploit this to run arbitrary code under the account of a user
>> that receives a message from them using Claws Mail.
>>
>> For the oldstable distribution (wheezy), this problem has been fixed
>> in version 3.8.1-2+deb7u1.
>>
>> For the stable distribution (jessie), this problem has been fixed in
>> version 3.11.1-3+deb8u1.
>>
>> We recommend that you upgrade your claws-mail packages.
>>
>> Further information about Debian Security Advisories, how to apply
>> these updates to your system and frequently asked questions can be
>> found at: https://www.debian.org/security/
>>
>> Mailing list: debian-security-annou...@lists.debian.org
>> -BEGIN PGP SIGNATURE-
>> Version: GnuPG v1
>>
>> iQIcBAEBCgAGBQJWoxmeAAoJEAVMuPMTQ89EUJwP/jLpgiW3wqnjAjPJ53Ok72e9
>> UWtCI53YUbWLtaTv8sHQGvRw46ZIHYqsINxOQPJW/NOzE3FofapM/YQtxcJn+7GD
>> mZq+uyWxsfEKMG6X6wOji8yKtEumq5FuPfZ3B3iapzTqBKI93yAaR29/XK8wA+U3
>> OYW9MrPz0Ay++jU7G/CxnE57UhgIb8oKgEebaoxC7CLfxkhAltqOsnYH4trSMXQg
>> SUHMug4gIqTb2CiYPrsZzudtawhNTlFEcVbNw8OuMVwXuXuwEYq0LjZGb99638zp
>> B97JPkWdEYzHYDPnR4AQDPk7BUPK6gFE+WuRHm+3FlAyLWcQM6rrr4CiFtVlLY7p
>> 4xyyPGO/VIZWDoEVra5WtLMehLpLMD+ON/27T36X8i7sBsKhg5cR5WJ3AFhADjwd
>> iMB2RZLdAs48F+IMQKCWr1zG8sf/7xYw5pT+Ue1nBAJUzuL3W9dCO/PVG4oVXq83
>> O9OtE5d2DMIv3KEqmkulQLYbl6WtWn7U2b1eVDtGJwAI3IS1BfyKMgMa+iD9aE20
>> e1HGX9AbWMoA4t+1himO7EEeY6gbl5wAs6RyT0vYfYv1ZFTFFIMZekagvpjC3TAQ
>> 2P4aESIDUKOXwmzjqVote/h9qOe+j0BFRtP+ytlL7WabFO/hWLmLdH6MVBGMXEGD
>> HcCkW+hBThxfu+PWo0uu
>> =/Stx
>> -END PGP SIGNATURE-
>>
>>


-- 
-
Vaughn Graham
Web Lacky Third Class


unsuscribe

2016-01-22 Thread Kopilous Kopilous
Le 23 janv. 2016 07:31, "Ben Hutchings"  a écrit :

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> - -
> Debian Security Advisory DSA-3452-1   secur...@debian.org
> https://www.debian.org/security/Ben Hutchings
> January 23, 2016  https://www.debian.org/security/faq
> - -
>
> Package: claws-mail
> CVE ID : CVE-2015-8614
>
> "DrWhax" of the Tails project reported that Claws Mail is missing
> range checks in some text conversion functions.  A remote attacker
> could exploit this to run arbitrary code under the account of a user
> that receives a message from them using Claws Mail.
>
> For the oldstable distribution (wheezy), this problem has been fixed
> in version 3.8.1-2+deb7u1.
>
> For the stable distribution (jessie), this problem has been fixed in
> version 3.11.1-3+deb8u1.
>
> We recommend that you upgrade your claws-mail packages.
>
> Further information about Debian Security Advisories, how to apply
> these updates to your system and frequently asked questions can be
> found at: https://www.debian.org/security/
>
> Mailing list: debian-security-annou...@lists.debian.org
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1
>
> iQIcBAEBCgAGBQJWoxmeAAoJEAVMuPMTQ89EUJwP/jLpgiW3wqnjAjPJ53Ok72e9
> UWtCI53YUbWLtaTv8sHQGvRw46ZIHYqsINxOQPJW/NOzE3FofapM/YQtxcJn+7GD
> mZq+uyWxsfEKMG6X6wOji8yKtEumq5FuPfZ3B3iapzTqBKI93yAaR29/XK8wA+U3
> OYW9MrPz0Ay++jU7G/CxnE57UhgIb8oKgEebaoxC7CLfxkhAltqOsnYH4trSMXQg
> SUHMug4gIqTb2CiYPrsZzudtawhNTlFEcVbNw8OuMVwXuXuwEYq0LjZGb99638zp
> B97JPkWdEYzHYDPnR4AQDPk7BUPK6gFE+WuRHm+3FlAyLWcQM6rrr4CiFtVlLY7p
> 4xyyPGO/VIZWDoEVra5WtLMehLpLMD+ON/27T36X8i7sBsKhg5cR5WJ3AFhADjwd
> iMB2RZLdAs48F+IMQKCWr1zG8sf/7xYw5pT+Ue1nBAJUzuL3W9dCO/PVG4oVXq83
> O9OtE5d2DMIv3KEqmkulQLYbl6WtWn7U2b1eVDtGJwAI3IS1BfyKMgMa+iD9aE20
> e1HGX9AbWMoA4t+1himO7EEeY6gbl5wAs6RyT0vYfYv1ZFTFFIMZekagvpjC3TAQ
> 2P4aESIDUKOXwmzjqVote/h9qOe+j0BFRtP+ytlL7WabFO/hWLmLdH6MVBGMXEGD
> HcCkW+hBThxfu+PWo0uu
> =/Stx
> -END PGP SIGNATURE-
>
>


Unsuscribe troubles ... A 3098-1] graphviz security update

2014-12-13 Thread Migsdk86
Please unsuscribe due trouble informe my disk storage capacity

Best regiones 

Salvatore Bonaccorso car...@debian.org escribió:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-3098-1   secur...@debian.org
http://www.debian.org/security/  Salvatore Bonaccorso
December 11, 2014  http://www.debian.org/security/faq
- -

Package: graphviz
CVE ID : CVE-2014-9157
Debian Bug : 772648

Joshua Rogers discovered a format string vulnerability in the yyerror
function in lib/cgraph/scan.l in Graphviz, a rich set of graph drawing
tools. An attacker could use this flaw to cause graphviz to crash or
possibly execute arbitrary code.

For the stable distribution (wheezy), this problem has been fixed in
version 2.26.3-14+deb7u2.

For the upcoming stable distribution (jessie), this problem will be
fixed soon in version 2.38.0-7.

For the unstable distribution (sid), this problem has been fixed in
version 2.38.0-7.

We recommend that you upgrade your graphviz packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=J1ug
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xz6z4-0002ke...@master.debian.org



UNSUSCRIBE

2014-07-09 Thread virgic...@hotmail.com


THX


Message du : 08/07/2014 23:34
De : Salvatore Bonaccorso  car...@debian.org
A : debian-security-annou...@lists.debian.org
Copie à : 
Sujet : [SECURITY] [DSA 2974-1] php5 security update


 -BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2974-1   secur...@debian.org
http://www.debian.org/security/  Salvatore Bonaccorso
July 08, 2014  http://www.debian.org/security/faq
- -

Package: php5
CVE ID : CVE-2014-0207 CVE-2014-3478 CVE-2014-3479 CVE-2014-3480
 CVE-2014-3487 CVE-2014-3515 CVE-2014-4721

Several vulnerabilities were found in PHP, a general-purpose scripting
language commonly used for web application development. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2014-0207

Francisco Alonso of the Red Hat Security Response Team reported an
incorrect boundary check in the cdf_read_short_sector() function.

CVE-2014-3478

Francisco Alonso of the Red Hat Security Response Team discovered a
flaw in the way the truncated pascal string size in the mconvert()
function is computed.

CVE-2014-3479

Francisco Alonso of the Red Hat Security Response Team reported an
incorrect boundary check in the cdf_check_stream_offset() function.

CVE-2014-3480

Francisco Alonso of the Red Hat Security Response Team reported an
insufficient boundary check in the cdf_count_chain() function.

CVE-2014-3487

Francisco Alonso of the Red Hat Security Response Team discovered an
incorrect boundary check in the cdf_read_property_info() funtion.

CVE-2014-3515

Stefan Esser discovered that the ArrayObject and the
SPLObjectStorage unserialize() handler do not verify the type of
unserialized data before using it. A remote attacker could use this
flaw to execute arbitrary code.

CVE-2014-4721

Stefan Esser discovered a type confusion issue affecting phpinfo(),
which might allow an attacker to obtain sensitive information from
process memory.

For the stable distribution (wheezy), these problems have been fixed in
version 5.4.4-14+deb7u12. In addition, this update contains several
bugfixes originally targeted for the upcoming Wheezy point release.

For the testing distribution (jessie), these problems have been fixed in
version 5.6.0~rc2+dfsg-1.

For the unstable distribution (sid), these problems have been fixed in
version 5.6.0~rc2+dfsg-1.

We recommend that you upgrade your php5 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=+AZH
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1x4d2d-0008tu...@master.debian.org




unsuscribe

2012-02-21 Thread Agustin Cianciulli



-Mensaje original- 
From: Nico Golde

Sent: Tuesday, February 21, 2012 7:54 PM
To: debian-security-annou...@lists.debian.org
Subject: [SECURITY] [DSA 2414-1] fex security update

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -
Debian Security Advisory DSA-2413-1   secur...@debian.org
http://www.debian.org/security/Nico Golde
February 21, 2012  http://www.debian.org/security/faq
- -

Package: fex
Vulnerability  : insufficient input sanitization
Problem type   : remote
Debian-specific: no
CVE ID : CVE-2012-0869

Nicola Fioravanti discovered that F*X, a web service for transferring
very large files, is not properly sanitizing input parameters of the fup
script.  An attacker can use this flaw to conduct reflected cross-site
scripting attacks via various script parameters.

For the stable distribution (squeeze), this problem has been fixed in
version 20100208+debian1-1+squeeze2.

For the testing distribution (wheezy), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed
in version 20120215-1.

We recommend that you upgrade your fex packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk9EIJ0ACgkQHYflSXNkfP9sRwCguCPbt0Ip6mCJMnfv0HXBLmKj
HvwAnjwOhMw8QqcSWQsgVJFA8KWcyg9g
=mRCu
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact 
listmas...@lists.debian.org

Archive: http://lists.debian.org/20120221225421.ga2...@ngolde.de


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/bay169-ds6b13aa71e7a6afd2a2c4e83...@phx.gbl



unsuscribe

2011-12-26 Thread ChHnsn

Le 26 déc. 2011 à 13:33, Moritz Muehlenhoff a écrit :

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - -
 Debian Security Advisory DSA-2374-1   secur...@debian.org
 http://www.debian.org/security/Moritz Muehlenhoff
 December 26, 2011  http://www.debian.org/security/faq
 - -
 
 Package: openswan
 Vulnerability  : implementation error
 Problem type   : remote
 Debian-specific: no
 CVE ID : CVE-2011-4073 
 Debian Bug : 650674
 
 The information security group at ETH Zurich discovered a denial of 
 service vulnerability in the crypto helper handler of the IKE daemon
 pluto. More information can be found in the upstream advisory at
 http://openswan.org/download/CVE-2011-4073/CVE-2011-4073.txt  
 
 For the oldstable distribution (lenny), this problem has been fixed in
 version 1:2.4.12+dfsg-1.3+lenny4.
 
 For the stable distribution (squeeze), this problem has been fixed in
 version 1:2.6.28+dfsg-5+squeeze1.
 
 For the unstable distribution (sid), this problem has been fixed in
 version 1:2.6.37-1.
 
 We recommend that you upgrade your openswan packages.
 
 Further information about Debian Security Advisories, how to apply
 these updates to your system and frequently asked questions can be
 found at: http://www.debian.org/security/
 
 Mailing list: debian-security-annou...@lists.debian.org
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.11 (GNU/Linux)
 
 iEYEARECAAYFAk74aSoACgkQXm3vHE4uyloTDQCgobh8B9WHUz0ayT4KJvi9C00J
 1wYAoOdI8X4m6qEWn1cY2JKT/NERWBeJ
 =1tWK
 -END PGP SIGNATURE-
 
 
 -- 
 To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: http://lists.debian.org/20111226123324.GA6951@pisco.westfalen.local
 


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/c95423ac-305d-432a-bf7d-5a76bc1aa...@gmail.com



unsuscribe

2008-09-12 Thread c . eyss
Thanks!


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



UNSUSCRIBE

2008-04-13 Thread Xavier Morell



UNSUSCRIBE

2007-06-10 Thread flo hahn


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2007-06-10 Thread flo hahn


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-11-14 Thread lepec
unsuscribe
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-11-10 Thread Daniel Almenares
Martin Schulze wrote:
 --
 Debian Security Advisory DSA 887-1 [EMAIL PROTECTED]
 http://www.debian.org/security/ Martin Schulze
 November 7th, 2005  http://www.debian.org/security/faq
 --

 Package: clamav
 Vulnerability  : several
 Problem type   : remote
 Debian-specific: no
 CVE IDs: CVE-2005-3239 CVE-2005-3303 CVE-2005-3500 CVE-2005-3501

 Several vulnerabilities have been discovered in Clam AntiVirus, the
 antivirus scanner for Unix, designed for integration with mail servers
 to perform attachment scanning.  The Common Vulnerabilities and
 Exposures project identifies the following problems:

 CVE-2005-3239

 The OLE2 unpacker allows remote attackers to cause a segmentation
 fault via a DOC file with an invalid property tree, which triggers
 an infinite recursion.

 CVE-2005-3303

 A specially crafted executable compressed with FSG 1.33 could
 cause the extractor to write beyond buffer boundaries, allowing an
 attacker to execute arbitrary code.

 CVE-2005-3500

 A specially crafted CAB file could cause ClamAV to be locked in an
 infinite loop and use all available processor resources, resulting
 in a denial of service.

 CVE-2005-3501

 A specially crafted CAB file could cause ClamAV to be locked in an
 infinite loop and use all available processor resources, resulting
 in a denial of service.

 The old stable distribution (woody) does not contain clamav packages.

 For the stable distribution (sarge) these problems have been fixed in
 version 0.84-2.sarge.6.

 For the unstable distribution (sid) these problems have been fixed in
 version 0.87.1-1.

 We recommend that you upgrade your clamav packages.


 Upgrade Instructions
 

 wget url
 will fetch the file for you
 dpkg -i file.deb
 will install the referenced file.

 If you are using the apt-get package manager, use the line for
 sources.list as given below:

 apt-get update
 will update the internal database
 apt-get upgrade
 will install corrected packages

 You may use an automated update by adding the resources from the
 footer to the proper configuration.


 Debian GNU/Linux 3.1 alias sarge
 

   Source archives:


 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.6.dsc
   Size/MD5 checksum:  872 dbecf7f7f16f69bdbad77a24106f7779

 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.6.diff.gz
   Size/MD5 checksum:   177500 64ba2a8ad84cc961a564eaac4d65a642

 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84.orig.tar.gz
   Size/MD5 checksum:  4006624 c43213da01d510faf117daa9a4d5326c

   Architecture independent components:


 http://security.debian.org/pool/updates/main/c/clamav/clamav-base_0.84-2.sarge.6_all.deb
   Size/MD5 checksum:   154598 3a979fedbb1102fbe4c710621513ec4f

 http://security.debian.org/pool/updates/main/c/clamav/clamav-docs_0.84-2.sarge.6_all.deb
   Size/MD5 checksum:   690218 4143f2f7719c3a359e9c2c7079a9674f

 http://security.debian.org/pool/updates/main/c/clamav/clamav-testfiles_0.84-2.sarge.6_all.deb
   Size/MD5 checksum:   123568 2ac5e526c3063a704f68233a56b1d9a3

   Alpha architecture:


 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.6_alpha.deb
   Size/MD5 checksum:74682 a8a3aa80c3030c5541d5444f7dfb5e39

 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.6_alpha.deb
   Size/MD5 checksum:48774 64a2bfb8d0578085b4e64853a2c4686f

 http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.6_alpha.deb
   Size/MD5 checksum:  2176366 88cce725133f000ca90f2db1cf05561f

 http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.6_alpha.deb
   Size/MD5 checksum:42114 b8c7c0ca88544cdaaba1b8a397cd8d83

 http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.6_alpha.deb
   Size/MD5 checksum:   255164 b245e6b7b72e215738a9ebabd5bf81f2

 http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.6_alpha.deb
   Size/MD5 checksum:   284690 377a0ba8c870ab5bfab6fe41cf8fb123

   AMD64 architecture:


 http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.6_amd64.deb
   Size/MD5 checksum:68874 f5d18144c18d86fbf2151d365e55da1c

 http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.6_amd64.deb
   Size/MD5 checksum:44190 58d96c1544570a9e54be0d24a66f8aa5

 http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.6_amd64.deb
   Size/MD5 checksum:  2173202 

!!!! UNSUSCRIBE !!!!

2005-09-30 Thread Benjamin Maerte

Vincent Caron a écrit :


On Fri, 2005-09-30 at 08:49 +0200, Martin Schulze wrote:
 


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 829-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
September 30, 2005  http://www.debian.org/security/faq
- --

Package: mysql
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE ID : CAN-2005-2558
BugTraq ID : 14509

A stack-based buffer overflow in the init_syms function of MySQL, a
popular database, has been discovered that allows remote authenticated
users who can create user-defined functions to execute arbitrary code
via a long function_name field.  The ability to create user-defined
functions is not typically granted to untrusted users.

The following vulnerability matrix shows which version of MySQL in
which distribution has this problem fixed:

woody  sarge  sid
mysql 3.23.49-8.14   n/a   n/a
mysql-dfsgn/a  4.0.24-10sarge14.0.24-10sarge1
mysql-dfsg-4.1n/a  4.1.11a-4sarge24.1.14-2
mysql-dfsg-5.0n/an/a5.0.11beta-3
   



 That's not one of our package, I've checked.



 




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



READ the footer at the bottom of every message (was Re: !!!! UNSUSCRIBE !!!!)

2005-09-30 Thread Edward J. Shornock

1) Spell it properly
2) Read the email footer:

To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact 
[EMAIL PROTECTED]


3) Don't reply to all on mailing lists, especially with an unsubscribe 
request



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-06-28 Thread Axel Renault




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-03-15 Thread Diego Labonia

-- Mensaje Original --
Date: Mon, 14 Mar 2005 17:22:59 +0100 (CET)
To: debian-security-announce@lists.debian.org (Debian Security Announcements)
From: [EMAIL PROTECTED] (Martin Schulze)
Subject: [SECURITY] [DSA 693-1] New luxman packages fix local root exploit
Reply-To: debian-security@lists.debian.org


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 693-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 14, 2005  http://www.debian.org/security/faq
- --

Package: luxman
Vulnerability  : buffer overflow
Problem-Type   : local
Debian-specific: no
CVE ID : CAN-2005-0385

Kevin Finisterre discovered a buffer overflow in luxman, an SVGA based
PacMan clone, that could lead to the execution of arbitrary commands
as root.

For the stable distribution (woody) this problem has been fixed in
version 0.41-17.2.

For the unstable distribution (sid) this problem has been fixed in
version 0.41-20.

We recommend that you upgrade your luxman package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2.dsc
  Size/MD5 checksum:  570 a55086f936bbcfe22598ac0aeb94f8da

 http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2.diff.gz
  Size/MD5 checksum: 7105 8719173e012bab5680d138d25e30b619

 http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41.orig.tar.gz
  Size/MD5 checksum:   268279 aa389327578e2d65f3f5035193e407cb

  Intel IA-32 architecture:


 http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2_i386.deb
  Size/MD5 checksum:   290762 c4123222e992a37dcf609768a20e7e8f


  These files will probably be moved into the stable distribution on
  its next update.

- 
-
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCNbpiW5ql+IAeqTIRAhtSAJ0d3a6I8wMPZUxKMaOGXtd5oZ7MJgCeI3NF
FIFFNlRq/R/T9Qs2asyHLSo=
=NXet
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



__

Obtenga gratis su cuenta @Argentina.com con AntiVirus, 20mb de espacio, 
acceso POP3 y SMTP en 24 ciudades www.Argentina.com



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



unsuscribe

2005-01-19 Thread Aurelien Roux
Le Tue, Jan 18, 2005 at 10:41:00AM +0100, Martin Schulze a écrit :
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - --
 Debian Security Advisory DSA 644-1 [EMAIL PROTECTED]
 http://www.debian.org/security/ Martin Schulze
 January 18th, 2005  http://www.debian.org/security/faq
 - --
 
 Package: chbg
 Vulnerability  : buffer overflow
 Problem-Type   : local
 Debian-specific: no
 CVE ID : CAN-2004-1264
 Debian Bug : 285904
 
 Danny Lungstrom discoverd a vulnerability in chbg, a tool to change
 background pictures.  A maliciously crafted configuration/scenario
 file could overflow a buffer and lead to the execution of arbitrary
 code on the victim's machine.
 
 For the stable distribution (woody) this problem has been fixed in
 version 1.5-1woody1.
 
 For the unstable distribution (sid) this problem has been fixed in
 version 1.5-4.
 
 We recommend that you upgrade your chbg package.
 
 
 Upgrade Instructions
 - 
 
 wget url
 will fetch the file for you
 dpkg -i file.deb
 will install the referenced file.
 
 If you are using the apt-get package manager, use the line for
 sources.list as given below:
 
 apt-get update
 will update the internal database
 apt-get upgrade
 will install corrected packages
 
 You may use an automated update by adding the resources from the
 footer to the proper configuration.
 
 
 Debian GNU/Linux 3.0 alias woody
 - 
 
   Source archives:
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1.dsc
   Size/MD5 checksum:  600 3cb28b61fb97dca63f09a486dae5612f
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1.diff.gz
   Size/MD5 checksum: 3612 08098cf0fec406380e968186766de027
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5.orig.tar.gz
   Size/MD5 checksum:   322878 4a158c94c25b359c86da1de9ef3e986b
 
   Alpha architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_alpha.deb
   Size/MD5 checksum:   294456 afd6ce377d43c0df909d955e04c328cd
 
   ARM architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_arm.deb
   Size/MD5 checksum:   247338 878c528ab81decd999503ad47557fc4a
 
   Intel IA-32 architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_i386.deb
   Size/MD5 checksum:   244862 d3a09b86dfc44164c541cda2eb66ce66
 
   Intel IA-64 architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_ia64.deb
   Size/MD5 checksum:   345228 e4b9ae6b9da9c34d5a930727bdfc1a44
 
   HP Precision architecture:
 
 Cannot be updated due to compiler error.
 
   Motorola 680x0 architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_m68k.deb
   Size/MD5 checksum:   222916 7dce4c0b3ae27f624ee472bd153d5c66
 
   Big endian MIPS architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_mips.deb
   Size/MD5 checksum:   249054 66402b53b158bfa0b2144b6b97b1d794
 
   Little endian MIPS architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_mipsel.deb
   Size/MD5 checksum:   247536 769f5074ad1f4b148191d0e196d01778
 
   PowerPC architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_powerpc.deb
   Size/MD5 checksum:   271272 f6b03b2a05de42ee203d7d9cbfe7c468
 
   IBM S/390 architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_s390.deb
   Size/MD5 checksum:   239098 f20c7b0e36ecfc4540d3673f4ec477dd
 
   Sun Sparc architecture:
 
 
 http://security.debian.org/pool/updates/main/c/chbg/chbg_1.5-1woody1_sparc.deb
   Size/MD5 checksum:   263302 28df5318e314bbaf79493b485aa6cffa
 
 
   These files will probably be moved into the stable distribution on
   its next update.
 
 - 
 -
 For apt-get: deb http://security.debian.org/ stable/updates main
 For dpkg-ftp: ftp://security.debian.org/debian-security 
 dists/stable/updates/main
 Mailing list: debian-security-announce@lists.debian.org
 Package info: `apt-cache show pkg' and http://packages.debian.org/pkg
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.2.5 (GNU/Linux)
 
 iD8DBQFB7NmrW5ql+IAeqTIRAmUEAKCLSpd0/8eiiFhfymdRCV70pS6p9QCfUIfW
 JmmWy3Pi87ZjfreLomQQIls=
 =WpPd
 -END PGP SIGNATURE-
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 

-- 
==
Aurélien Roux 

Doctorant (PhD)

Laboratoire d'Acoustique de 

unsuscribe

2003-12-17 Thread Raul
unsuscribe

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


unsuscribe

2003-12-17 Thread Raul

unsuscribe



unsuscribe

2003-02-03 Thread Mariana . Bence


-Mensaje original-
De: Mike Barushok [mailto:[EMAIL PROTECTED]
Enviado el: Lunes 3 de Febrero de 2003 04:15
Para: Stefaan Teerlinck
Cc: debian-security@lists.debian.org
Asunto: Re: formmail.pl



Correction on my earlier reply, to find the location of all the
formmail files, use:
  find /home/ -name formmail*

(If all your sites are under /home/ )

On Mon, 3 Feb 2003, Stefaan Teerlinck wrote:

 Hi,
 
 I have a server with a lot of name-based virtual hosts. On one of those
 sites the formmail.pl script is being abused, a client is using an
 unsecure script. How can I find out on what site this is?
 
 Thanks,
 Stefaan.
 
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]



Unsuscribe

2002-11-11 Thread Gelokatil Registred Trademark

Únete al mayor servicio mundial de correo electrónico: Haz clic aquí 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Unsuscribe

2002-11-11 Thread belg
Lovley! :P

On Mon, 11 Nov 2002, Gelokatil Registred Trademark wrote:






 
 Únete al mayor servicio mundial de correo electrónico: Haz clic aquí --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a
 subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Unsuscribe

2002-11-11 Thread Gelokatil Registred Trademark

Únete al mayor servicio mundial de correo electrónico: Haz clic aquí 



Re: Unsuscribe

2002-11-11 Thread belg
Lovley! :P

On Mon, 11 Nov 2002, Gelokatil Registred Trademark wrote:






 
 ?nete al mayor servicio mundial de correo electr?nico: Haz clic aqu? --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a
 subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




unsuscribe

2002-10-28 Thread Sancho Lerena Urrea
unsuscribe
-- 
__
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




unsuscribe

2002-10-28 Thread Sancho Lerena Urrea
unsuscribe
-- 
__
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup



unsuscribe

2001-04-13 Thread graciela . lopez

 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




unsuscribe

2001-04-13 Thread graciela . lopez