oss-security August 2010 archive
Main Archive Page > Month Archives  > oss-security archives
oss-security: By Date

oss-security By Date

SubjectAuthorDate
Re: [oss-security] CVE Request: BGP protocol vulnerabilitySteven M. Christey
Re: [oss-security] CVE id request: libc fortify source information disclosureSteven M. Christey
Re: [oss-security] CVE id request: libc fortify source information disclosureJosh Bressers
Re: [oss-security] CVE request: serendipity < 1.5.4 xssJosh Bressers
[oss-security] Re: [PATCH] exec argument expansion can inappropriately triggerOOM-killerTetsuo Handa
[oss-security] Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killerSolar Designer
[oss-security] Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killerRoland McGrath
[oss-security] CVE-2010-2955 kernel: wireless: fix 64K kernel heap content leak via ioctlEugene Teo
[oss-security] Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killerBrad Spengler
[oss-security] CVE Request -- MySQL v5.1.49 -- multiple DoS flawsJan Lieskovsky
[oss-security] Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killerSolar Designer
[oss-security] Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killerSolar Designer
[oss-security] Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killerRoland McGrath
Re: [oss-security] CVE Request: BGP protocol vulnerabilityJosh Bressers
[oss-security] Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killerSolar Designer
[oss-security] Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killerRoland McGrath
[oss-security] Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killerKOSAKI Motohiro
[oss-security] Hardening the linker (was Re: [oss-security] CVE request: CouchDB insecure library loading (Debian/Ubuntu only))Tim Brown
[oss-security] CVE request: serendipity < 1.5.4 xssHanno Böck
Re: [oss-security] CVE Request: BGP protocol vulnerabilityFlorian Weimer
Re: [oss-security] CVE Request: BGP protocol vulnerabilityKurt Seifried
[oss-security] CVE Request: BGP protocol vulnerabilityFlorian Weimer
ezmlm warningoss-security-help_at_nospam
[oss-security] [PATCH] exec argument expansion can inappropriately trigger OOM-killerKees Cook
Re: [oss-security] CVE request: CouchDB insecure library loading (Debian/Ubuntu only)Josh Bressers
[oss-security] [HITB-Announce] HITB2010 SIGNINT SessionsHafez Kamal
Re: [oss-security] CVE request: ghostscript and gvTomas Hoger
Re: [oss-security] CVE request: VLC media player - DLL preloading vulnerabilityGeoffroy Couprie
Re: [oss-security] CVE request: CouchDB insecure library loading (Debian/Ubuntu only)Tomas Hoger
Re: [oss-security] CVE request: VLC media player - DLL preloading vulnerabilitySteven M. Christey
[oss-security] CVE request: VLC media player - DLL preloading vulnerabilityGeoffroy Couprie
[oss-security] CVE id request: libc fortify source information disclosureNico Golde
[oss-security] CVE request: CouchDB insecure library loading (Debian/Ubuntu only)Dan Rosenberg
Re: [oss-security] Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver presentJosh Bressers
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Josh Bressers
Re: [oss-security] CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update requestJosh Bressers
Re: [oss-security] CVE request: ghostscript and gvLudwig Nussel
[oss-security] Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver presentAmos Jeffries
Re: [oss-security] CVE request: ghostscript and gvTomas Hoger
[oss-security] Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver presentStephen Thorne
[oss-security] CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver presentJan Lieskovsky
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Steven M. Christey
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Tomas Hoger
[oss-security] CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update requestJan Lieskovsky
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Pierre Joye
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Thomas Biege
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Pierre Joye
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Moritz Muehlenhoff
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Pierre Joye
Re: [oss-security] Qt SSL endless loopVincent Danen
Re: [oss-security] Qt SSL endless loopSteven M. Christey
Re: [oss-security] CVE request: lxrSteven M. Christey
Re: [oss-security] CVE Request: heap-based buffer overflow in libHXJosh Bressers
Re: [oss-security] CVE request - kernel: jfs: don't allow os2 xattr namespace overlap with othersJosh Bressers
Re: [oss-security] CVE Request: SLiM insecure PATH assignmentJosh Bressers
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Steven M. Christey
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Pierre Joye
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Pierre Joye
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Tomas Hoger
[oss-security] CVE Request: heap-based buffer overflow in libHXThomas Biege
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Pierre Joye
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Tomas Hoger
[oss-security] CVE-2010-2959 kernel: can: add limit for nframes and clean up signed/unsigned variablesEugene Teo
[oss-security] CVE request - kernel: jfs: don't allow os2 xattr namespace overlap with othersEugene Teo
[oss-security] CVE Request: SLiM insecure PATH assignmentNiels Heinen
Re: [oss-security] CVE request: zope-ldapuserJosh Bressers
Re: [oss-security] CVE-2008-id Request -- ssmtp -- standardise() -- Buffer overflowSteven M. Christey
Re: [oss-security] CVE request - kernel: xfs: stale data exposureJosh Bressers
Re: [oss-security] CVE request - kernel: net sched memleakJosh Bressers
Re: [oss-security] CVE request: PHP MOPS-2010-56..60pierre.php_at_nospam
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Moritz Muehlenhoff
Re: [oss-security] CVE request: PHP MOPS-2010-56..60Tomas Hoger
[oss-security] CVE request: zope-ldapuserSébastien Delafond
[oss-security] CVE request - kernel: xfs: stale data exposureEugene Teo
[oss-security] CVE request - kernel: net sched memleakEugene Teo
Re: [oss-security] [oCERT-2010-001] multiple http client unexpected download filename vulnerabilitySolar Designer
Re: [oss-security] CVE request - kernel: integer overflow in ext4_ext_get_blocks()Eugene Teo
[oss-security] Minor security flaw with pam_xauthTim Brown
[oss-security] CVE request - kernel: integer overflow in ext4_ext_get_blocks()Eugene Teo
Re: [oss-security] kernel: [PARISC] led.c - fix potential stack overflow in led_proc_write()Eugene Teo
Re: [oss-security] kernel: [PARISC] led.c - fix potential stack overflow in led_proc_write()Ben Hutchings
Re: [oss-security] kernel: [PARISC] led.c - fix potential stack overflow in led_proc_write()Eugene Teo
Re: [oss-security] kernel: [PARISC] led.c - fix potential stack overflow in led_proc_write()dann frazier
Re: [oss-security] RFC: squid: Fix free memory corruption and off-by-on error when comparing SNMP OIDsJosh Bressers
Re: [oss-security] RFC: squid: Fix free memory corruption and off-by-on error when comparing SNMP OIDsThomas Biege
Re: [oss-security] RFC: squid: Fix free memory corruption and off-by-on error when comparing SNMP OIDsHenrik Nordstrm
Re: [oss-security] CVE Request: openssl double freeJosh Bressers
Re: [oss-security] opera 10.61 fixes 3 security bugsCarsten H. Eiram
Re: [oss-security] CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three moreRobert Święcki
[oss-security] opera 10.61 fixes 3 security bugsThomas Biege
Re: [oss-security] CVE Request: openssl double freeSolar Designer
Re: [oss-security] CVE request: VideoLAN advisory 1004Josh Bressers
Re: [oss-security] CVE Request -- OpenOffice.org [two ids]: 1, integer truncation error 2, short integer overflowJosh Bressers
[oss-security] CVE request: VideoLAN advisory 1004Rémi Denis-Courmont
[oss-security] CVE Request: openssl double freeLudwig Nussel
[oss-security] CVE Request -- OpenOffice.org [two ids]: 1, integer truncation error 2, short integer overflowJan Lieskovsky
Re: [oss-security] Re: CVE Request - ZNCJosh Bressers
Re: [oss-security] CVE ID Request For 2Wire Broadband Router Session Hijacking VulnerabilityJosh Bressers
ezmlm warningoss-security-help_at_nospam
[oss-security] CVE ID Request For 2Wire Broadband Router Session Hijacking VulnerabilityYGN Ethical Hacker Group
Re: [oss-security] kernel: [PARISC] led.c - fix potential stack overflow in led_proc_write()Hui Zhu
Re: [oss-security] CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three moreWerner LEMBERG
[oss-security] Re: CVE Request - ZNCKurt Seifried
[oss-security] CVE Request - ZNCKurt Seifried
Re: [oss-security] CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three moreRobert Święcki
Re: [oss-security] CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three moreWerner LEMBERG
Re: [oss-security] CVE request: LynxJosh Bressers
Re: [oss-security] CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three moreBraden Thomas
[oss-security] CVE request: LynxDan Rosenberg
Re: [oss-security] CVE request: uzbl before 2010.08.05: User-assisted execution of arbitrary commands caused by faulty default configJosh Bressers
Re: [oss-security] CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three moreJosh Bressers
[oss-security] CVE request: uzbl before 2010.08.05: User-assisted execution of arbitrary commands caused by faulty default configAlex Legler
Re: [oss-security] CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fonts + three moreJan Lieskovsky
[oss-security] CVE Request -- FreeType -- Memory corruption flaw by processing certain LWFN fontsJan Lieskovsky
Re: [oss-security] CVE-2010-2791: mod_proxy information leak affecting 2.2.9 onlySteven M. Christey
Re: [oss-security] CVE Request [two ids] -- cabextract -- 1, Infinite loop in MS-ZIP and Quantum decoders (minor) 2, Integer wrap-around (crash) by processing certain *.cab files in test archive modeSteven M. Christey