October 2005 Archives by date
Starting: Sat Oct 1 09:23:52 UTC 2005
Ending: Mon Oct 31 20:30:19 UTC 2005
Messages: 103
- [Secure-testing-team] Something is wrong with the mirroring
Andreas Barth
- [Secure-testing-team] Re: [Secure-testing-commits] r2256 - data/DSA
Florian Weimer
- [Secure-testing-team] Another syntax addition: <removed>
Moritz Muehlenhoff
- [Secure-testing-team] Another syntax addition: <removed>
Joey Hess
- [Secure-testing-team] Another syntax addition: <removed>
Moritz Muehlenhoff
- [Secure-testing-team] Another syntax addition: <removed>
Florian Weimer
- [Secure-testing-team] Another syntax addition: <removed>
Moritz Muehlenhoff
- [Secure-testing-team] Another syntax addition: <removed>
Florian Weimer
- [Secure-testing-team] Another syntax addition: <removed>
Moritz Muehlenhoff
- [Secure-testing-team] Re: Bug#332259: spampd fails with 'Error in
process_request': Modification of read-only variable in Syslog.pm
Sven Mueller
- [Secure-testing-team] Re: [mkanat@bugzilla.org: Security Advisory
for Bugzilla 2.18.3, 2.20rc2, and 2.21]
Martin Schulze
- [Secure-testing-team] CAN-2005-2933: Arbitrary code execution in
uw-imap
Martin Schulze
- [Secure-testing-team] 2.6.13.{123}
Horms
- [Secure-testing-team] A new round of kernel vulnerabilities
Moritz Muehlenhoff
- [Secure-testing-team] Re: Bug#332259: spampd fails with 'Error in
process_request': Modification of read-only variable in Syslog.pm
Sven Mueller
- [Secure-testing-team] 2.6.13.{123}
Moritz Muehlenhoff
- [Secure-testing-team] A new round of kernel vulnerabilities
micah
- [Secure-testing-team] 2.6.13.{123}
Horms
- [Secure-testing-team] Re: A new round of kernel vulnerabilities
Horms
- [Secure-testing-team] 2.6.13.{123}
Moritz Muehlenhoff
- [Secure-testing-team] Re: Bug#332259: spampd fails with 'Error in
process_request': Modification of read-only variable in Syslog.pm
Neil McGovern
- [Secure-testing-team] Re: Bug#332259: spampd fails with 'Error in
process_request': Modification of read-only variable in Syslog.pm
Martin Schulze
- [Secure-testing-team] Three more security problems in the 2.6 kernel
Moritz Muehlenhoff
- [Secure-testing-team] Re: Three more security problems in the 2.6
kernel
Martin Schulze
- [Secure-testing-team] Re: Three more security problems in the
2.6?kernel
Andreas Metzler
- [Secure-testing-team] Re: [Secure-testing-commits] r2366 - data/CAN
Florian Weimer
- [Secure-testing-team] Re: [Secure-testing-commits] r2366 -
data/CAN
Moritz Muehlenhoff
- [Secure-testing-team] Re: [Secure-testing-commits] r2366 -
data/CAN
Florian Weimer
- [Secure-testing-team] Re: Bug#332259: spampd fails with 'Error in
process_request': Modification of read-only variable in Syslog.pm
Sven Mueller
- [Secure-testing-team] Re: [Secure-testing-commits] r2366 -
data/CAN
Moritz Muehlenhoff
- [Secure-testing-team] Re: Bug#332259: spampd fails with 'Error in
process_request': Modification of read-only variable in Syslog.pm
Martin Schulze
- [Secure-testing-team] Another kernel vulnerability
Moritz Muehlenhoff
- [Secure-testing-team] testing security status
Joey Hess
- [Secure-testing-team] Re: Bug#332259: spampd fails with 'Error in
process_request': Modification of read-only variable in Syslog.pm
Sven Mueller
- [Secure-testing-team] Re: Three more security problems in the
2.6?kernel
Horms
- [Secure-testing-team] Re: testing security status
Jurij Smakov
- [Secure-testing-team] Re: testing security status
Steve Langasek
- [Secure-testing-team] Re: Three more security problems in the 2.6
kernel
Horms
- [Secure-testing-team] Re: Another kernel vulnerability
Horms
- [Secure-testing-team] 2.6.13.4
Horms
- [Secure-testing-team] 2.6.13.4
Horms
- [Secure-testing-team] Re: Three more security problems in the 2.6
kernel
Moritz Muehlenhoff
- [Secure-testing-team] Usertags in the BTS
Moritz Muehlenhoff
- [Secure-testing-team] Re: Three more security problems in the 2.6
kernel
Horms
- [Secure-testing-team] Re: iDEFENSE Security Advisory [IDEF1202]
Multiple Vendor wget/curl NTLM Buffer Overflow Vulnerability
Noèl Köthe
- [Secure-testing-team] Re: iDEFENSE Security Advisory [IDEF1202]
Multiple Vendor wget/curl NTLM Buffer Overflow Vulnerability
Florian Weimer
- [Secure-testing-team] Re: iDEFENSE Security Advisory
[IDEF1202] Multiple Vendor wget/curl NTLM Buffer Overflow Vulnerability
Noèl Köthe
- [Secure-testing-team] Re: iDEFENSE Security Advisory [IDEF1202]
Multiple Vendor wget/curl NTLM Buffer Overflow Vulnerability
Moritz Muehlenhoff
- [Secure-testing-team] "FIXES:" and "FIXED-BY:" directives
Moritz Muehlenhoff
- [Secure-testing-team] NVD cross-references
Florian Weimer
- [Secure-testing-team] "FIXES:" and "FIXED-BY:" directives
Florian Weimer
- [Secure-testing-team] Another syntax addition: <removed>
Florian Weimer
- [Secure-testing-team] "FIXES:" and "FIXED-BY:" directives
Moritz Muehlenhoff
- [Secure-testing-team] "FIXES:" and "FIXED-BY:" directives
Florian Weimer
- [Secure-testing-team] "FIXES:" and "FIXED-BY:" directives
Moritz Muehlenhoff
- [Secure-testing-team]
kernel allows loadkeys to be used by any user,
allowing for local root compromise
Horms
- [Secure-testing-team] Re: [Security] kernel allows loadkeys to be
used by any user, allowing for local root compromise
Andrew Morton
- [Secure-testing-team] Re: [Security] kernel allows loadkeys to be
used by any user, allowing for local root compromise
Horms
- [Secure-testing-team] "FIXES:" and "FIXED-BY:" directives
Florian Weimer
- [Secure-testing-team] "FIXES:" and "FIXED-BY:" directives
Moritz Muehlenhoff
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Krzysztof Halasa
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Rudolf Polzer
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Krzysztof Halasa
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Rudolf Polzer
- [Secure-testing-team] kernel allows loadkeys to be used by any
user, allowing for local root compromise
Moritz Muehlenhoff
- [Secure-testing-team] Re: kernel allows loadkeys to be used by
any user, allowing for local root compromise
Anthony DeRobertis
- [Secure-testing-team] Adding signatures to the public key of the
archive
Olivier Berger
- [Secure-testing-team] Adding signatures to the public key of the
archive
Andreas Barth
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Krzysztof Halasa
- [Secure-testing-team] Re: Investment Partnership
Mr.Ibrahim Khalifa.
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Rudolf Polzer
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Krzysztof Halasa
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Rudolf Polzer
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Krzysztof Halasa
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Rudolf Polzer
- [Secure-testing-team] bts usertags for CVE ids
Joey Hess
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Paul Jakma
- [Secure-testing-team] Re: [Secure-testing-commits] r2501 - in data:
CVE DSA
Florian Weimer
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Krzysztof Halasa
- [Secure-testing-team] Re: kernel allows loadkeys to be used by any
user, allowing for local root compromise
Bill Davidsen
- [Secure-testing-team] $B%O%a;#$jJs9p!y(B
info at zero-sen.com
- [Secure-testing-team] CVE-2005-2973: Yet another kernel DoS
Moritz Muehlenhoff
- [Secure-testing-team] Re: CVE-2005-2973: Yet another kernel DoS
dann frazier
- [Secure-testing-team] Re: CVE-2005-2973: Yet another kernel DoS
Florian Weimer
- [Secure-testing-team] [linux-2.6] Fix signedness issues in
net/core/filter.c
Florian Weimer
- [Secure-testing-team] Re: CVE-2005-2973: Yet another kernel DoS
dann frazier
- [Secure-testing-team] Re: [linux-2.6] Fix signedness issues in
net/core/filter.c
Horms
- [Secure-testing-team] Re: [linux-2.6] Fix signedness issues in
net/core/filter.c
Florian Weimer
- [Secure-testing-team] $B%(%m1|MM(B($B!&(B
$B"O!&(B)
info at osho-san.com
- [Secure-testing-team] Re: CVE-2005-2973: Yet another kernel DoS
Horms
- [Secure-testing-team] Re: CVE-2005-2973: Yet another kernel DoS
Horms
- [Secure-testing-team] Re: [linux-2.6] Fix signedness issues in
net/core/filter.c
Horms
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Moritz Muehlenhoff
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Thijs Kinkhorst
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Martin Schulze
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Thijs Kinkhorst
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Moritz Muehlenhoff
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Thijs Kinkhorst
- [Secure-testing-team] $B$"$J$?$K$OL4$,$"$j$^$9(B
info at uutrs.com
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Moritz Muehlenhoff
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Thijs Kinkhorst
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Moritz Muehlenhoff
- [Secure-testing-team] Re: Bug#335938: mantis: Mantis 't_core_path'
File Inclusion Vulnerability
Thijs Kinkhorst
Last message date:
Mon Oct 31 20:30:19 UTC 2005
Archived on: Mon Mar 13 12:28:27 UTC 2006
This archive was generated by
Pipermail 0.09 (Mailman edition).