Yes.
Does anybody know if it is being worked on? Isn't stuff like this
supposed to be backported into LTS releases? Or have I misread what LTS
means?
Thx
--
[CVE-2008-1927] Perl 5.8.8 vulnerability via UTF-8 regular expression
https://bugs.launchpad.net/bugs/221541
You received this bug notific
Hi & thanks
Why is this not a problem in intrepid? From what I understood all
versions since 2003 are vulnerable.
> More investigation is required.
Does that mean that you need to do more investigation or that someone else
(supposedly me) should?
krgds /m
--
CVE-2008-2952: BER Decoding Remote
** Visibility changed to: Public
--
CVE-2008-3658,2008-3659,2008-3660
https://bugs.launchpad.net/bugs/286851
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.c
*** This bug is a security vulnerability ***
Public security bug reported:
A BER decoding bug has been discovered in slapd (supposedly all versions
since 2003). All Ubuntu openldap packages seem affected. A fix has been
released. See
http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580;s
Hi
Does anybody know if this is also biting dapper 6.06 LTS? It has perl 5.8.7,
though.
thx /markus
--
[CVE-2008-1927] Perl 5.8.8 vulnerability via UTF-8 regular expression
https://bugs.launchpad.net/bugs/221541
You received this bug notification because you are a member of Ubuntu
Bugs, which i
*** This bug is a security vulnerability ***
Public security bug reported:
A BER decoding bug has been discovered in slapd (supposedly all versions
since 2003). All Ubuntu openldap packages seem affected. A fix has been
released. See
http://www.openldap.org/its/index.cgi/Software%20Bugs?id=5580;s
I can confirm that perl 5.8.7 on dapper is affected.
http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156 claims it's a
duplicate of http://rt.perl.org/rt3/Public/Bug/Display.html?id=40641,
which has a patch.
Is this going to be addressed anywhere in Ubuntu?
thx /markus
--
[CVE-2008-1927] P
This fails with exceptional uselessness if you (as I am) are using a
kernel which does not allow module loading at all.
The check for a kernel module in the file system should only be carried
out if no aes ciphers are found in /proc/crypto.
Probably as so:
+++/lib/cryptsetup/cryptdisks.functions
I have the same problem with Ubuntu TLS 6.06.1
--
Ubuntu Setup Stall: Tyan S3992, Broadcom SATA RAID, Serverworks HT1000
https://bugs.launchpad.net/bugs/113629
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing
My Server is a Dell PowerEdge 1435SC, with the same chipset as above
described.
--
Ubuntu Setup Stall: Tyan S3992, Broadcom SATA RAID, Serverworks HT1000
https://bugs.launchpad.net/bugs/113629
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for
Problem is that /bin/choose-mirror tries to fetch the Release file from
a remote mirror location. (This behavior is hard-coded)
I work with preseed files, netinstall over tftp-hpa, apache2 (own
repository, with month freezes) and in spite of the fact that I give the
mirror in the preseed file, cho
** Changed in: openssl (Ubuntu)
Assignee: (unassigned) => Claudio (ubuntu-bugs-apt-get)
--
if /etc/ssl is a link to another directory, the Package openssl overrides it.
https://bugs.launchpad.net/bugs/173026
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Public bug reported:
We have in each of our servers one crypto-device, mounted under /var.
>From there we link our confidential data to the right places in the system, so
>with /etc/ssl.
We are running TLS servers.
Issue:
After an upgrade of the openssl Package we could no longer ssh login at
13 matches
Mail list logo