[ MDVSA-2009:003 ] python

2009-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:003 http://www.mandriva.com/security/

[ MDVSA-2009:004 ] pam_mount

2009-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:004 http://www.mandriva.com/security/

[ MDVSA-2009:002 ] bind

2009-01-10 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:002 http://www.mandriva.com/security/

Re: Team SHATTER Security Advisory: Oracle Database Buffer Overflow in SYS.KUPF$FILE_INT.GET_FULL_FILENAME (DB11)

2009-01-10 Thread security curmudgeon
Hi Team SHATTER, Apologies for the very late reply, but I had a question regarding your advisory. I am CC'ing Oracle's security contact in hopes they can also reply with clarification. : Oracle Database Buffer Overflow in SYS.KUPF$FILE_INT.GET_FULL_FILENAME (DB11) : Details: : Oracle Database

Re: Team SHATTER Security Advisory: Oracle Database Buffer Overflow in SYS.KUPF$FILE_INT.GET_FULL_FILENAME (DB11)

2009-01-10 Thread Joxean Koret
Hi, This is very typical and, in my opinion, you should only consider trustworthy the Team Shatter's advisory, not the Oracle's one. Take for example the bug APPS01[1] in Oracle Critical Patch Update of April 2007 [2], it was a preauthenticated remote bug (with remote I mean "from internet", not