The google Chromium bug, which is linked above, claims the real fix on
their end should be out in the next few days.
--
apt-get hangs with "Waiting for headers" for exactly two minutes on
dl.google.com apt line
https://bugs.launchpad.net/bugs/528925
You received this bug notification because yo
Fixed in Debian as of package version 1.2.6-2, one version after the one
currently in Lucid.
See changelog here:
http://packages.debian.org/changelogs/pool/main/w/wireshark/wireshark_1.2.6-5/changelog
--
Must be run as root, which is not secure
https://bugs.launchpad.net/bugs/513903
You receive
This is the bug tracker for the Ubuntu nmap package.
Please take all discussion of the merits of distribution packaging vs DIY to a
different location, as they are orthogonal to this bug.
Thank you.
--
Nmap package missing lua libraries, also doesn't look in debian locations
https://bugs.launchp
Public bug reported:
"nmap -A example.com" fails on hosts that find a HTTP(S) port due to missing
LUA libraries.
Problem found in package nmap-4.62-1ubuntu1.
nmap should either include the necessary lua libraries like they do for the
scripts of previous versions(in the/usr/share/nmap/nselib and
We're way off topic now (sorry) but in fact Ubuntu does seem to realize there
is a problem and is addressing it.
My biggest complaint is that there was no news, and no clear way for me to help.
They are now advertising for more security engineers, and I am applying.
http://webapps.ubuntu.com/emplo
I can confirm that under the same kernel, linux-generic 2.6.24.18.41,
"restricted" nvidia driver has the 10 second or so screen freezing
delay, and the free nv driver has no delay.
I am unable to get linux-generic 2.6.24.19.21 working with the
restricted driver at the moment, so I can't report on
I must correct my above software list.
I forgot that due to other problems with the latest nvidia driver, I was really
running:
Software:
Ubuntu 8.04 64 bit
Firefox 3.0.1+build1+nobinonly-0ubuntu0.8.04.3
linux-generic 2.6.24.18.41
linux-restricted-modules-generic 2.6.24.18.41
nvidia restricted dri
I have the same problem with Firefox 3.0.1, 64 bit on 64 bit Ubuntu 8.04.
Problem exists with all extensions disabled, and also with noscript enabled, so
I don't believe it's a javascript problem.
I am running the restricted nvidia driver, I will later try and see if it
improves by switching to t
This has been addressed in Intrepid by updating to PHP 5 here:
https://launchpad.net/ubuntu/intrepid/+source/php5/5.2.6-1ubuntu1
Minimal patch above in this post
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/227464/comments/15
Re: test cases: I've not yet seen widely published exploit code,
This has been addressed in Intrepid buy updating to PHP 5 here:
https://launchpad.net/ubuntu/intrepid/+source/php5/5.2.6-1ubuntu1
Minimal patch above in this post
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/227464/comments/15
Re: test cases: I've not yet seen widely published exploit code
Impact:
Fixed possible stack buffer overflow in FastCGI SAPI
Impact:Potential DOS and remote code execution if using FastCGI
Updated PCRE to deal with issues fixed in USN-581-1
Impact:potential DOS and code execution
Fixes CVE-2008-0599
Impact:Potential DOS and remote code execu
Sorry, my listing of cURL exploit is not quite accurate, here's an updated
version with that and some other fixes (let that be a lesson for you, not to
post hastefully and in anger ;-)
Impact:
Fixed possible stack buffer overflow in FastCGI SAPI
Impact:Potential DOS and remote code executio
I'm sorry for whining to the people who are subscribed to and care about this
bug, but over 2 months since the release of a package with 3 claimed remotely
exploitable code injection bugs makes me VERY hesitant to ever recommend Ubuntu
for server use ever again.
By this time even the slow moving
Another month has passed, no release for Hardy.
I'm not savvy enough with the Ubuntu release procedures to even know who to
contact about this.
Could someone tell me what it would take to get these bugs fixed in the current
stable, advertised for server use Ubuntu?
There are 3 remote code execut
Fix released in Debian onMay 11.
Fixes are available both upstream in Debian and upstream in main package.
How can I help move this bug along?
--
PHP 5.2.6 fixes important security bugs
https://bugs.launchpad.net/bugs/227464
You received this bug notification because you are a member of Ubuntu
Bu
** Bug watch added: Debian Bug tracker #479723
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479723
** Also affects: php5 (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=479723
Importance: Unknown
Status: Unknown
--
PHP 5.2.6 fixes important security bugs
https:/
*** This bug is a security vulnerability ***
Public security bug reported:
Binary package hint: php5
PHP 5.2.6 fixes important security bugs
>From the release log:
Security Fixes
* Fixed possible stack buffer overflow in FastCGI SAPI. (Andrei Nigmatulin)
* Properly address incomplete m
** Summary changed:
- Wireshark 1.0 is available
+ Wireshark 1.0 is available- Fixes Multiple Vulnerabilities
** This bug has been flagged as a security issue
--
Wireshark 1.0 is available- Fixes Multiple Vulnerabilities
https://bugs.launchpad.net/bugs/210687
You received this bug notification
Note that this bug might be badly named, as there are multiple exploitable
vulnerabilities in the current version, and the previous releases should also
be patched ASAP.
http://www.wireshark.org/security/wnpa-sec-2008-02.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1561
http://cve.
19 matches
Mail list logo