For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2195
http://security-tracker.debian.net/tracker/CVE-2009-2195
--
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0
For security reasons, all text in this mail is double-rot13 encry
Hi Ana,
* Ana Guerrero <[EMAIL PROTECTED]> [2008-06-24 19:30]:
> On Sun, Nov 18, 2007 at 05:52:10PM +0100, Nico Golde wrote:
> > Package: konqueror
> > Severity: important
> >
> > the following CVE (Common Vulnerabilities & Exposures) id was
> > publis
rs.
>
> But I couldn't find it in neither kde3 or kde4.
>
> (I looked for the file mentioned ..)
Yes, same here. Looks like some deprecated package for kde
libs. I couldn't find that either in current source
packages. Marco, where did you get this information?
Kind regards
Nic
Hi,
please fix the code anyway.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpuD7if2KY4o.pgp
Description: PGP signature
Hi Fathi,
any news on the upstream opinion?
Cheers
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgp7X834pyIFs.pgp
Description: PGP signature
the vulnerability please also make sure to include the
CVE id in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1670
http://security-tracker.debian.net/tracker/CVE-2008-1670
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTE
Hi,
I only set the severity to important and did not make this
an RC bug as the impact of this is rather low/unimportant.
I see no obvious way to exploit the integer overflow here
that results in code execution and the only signals that can
be sent here are SIGUSR1.
Cheers
Nico
--
Nico
the vulnerability please also make sure to include the
CVE id in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1671
http://security-tracker.debian.net/tracker/CVE-2008-1671
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] -
this vulnerability please also include the CVE id
in your changelog entry.
At the moment we didn't rate this bug as a security concern,
please check back with upstream.
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6000
Kind regards
Nico
--
Nico Gol
/cgi-bin/cvename.cgi?name=CVE-2007-5393
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpPcqOk1PIvb.pgp
Description: PGP signature
=CVE-2007-5393
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpzlEaZCk3mT.pgp
Description: PGP signature
same. I wrote them a mail about the exact
difference.
Anyway, the patch from freedesktop.org is correct.
Kind regards
Nico
--
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgp8ml29EiM8C.pgp
Description: PGP signature
12 matches
Mail list logo