[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200D5BC42CE2674B9FA0FF70A0FF67E5297B7E1488@cca-mail1.commonwealthcare.org>
Date: Mon, 4 Oct 2010 09:26:20 -0400
From: "Mikhail A. Utin" <mutin@...monwealthcare.org>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Full-Disclosure Digest, Vol 68, Issue 5
Their policy of publishing whatever they think is buzzing cannot be respected by people who understand possible problems of innocent people involved. Leaking of military secrets is stupid as it gets. If they get closed, it is what they deserve.
Mikhail A. Utin, CISSP
-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk [mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of full-disclosure-request@...ts.grok.org.uk
Sent: Monday, October 04, 2010 7:00 AM
To: full-disclosure@...ts.grok.org.uk
Subject: Full-Disclosure Digest, Vol 68, Issue 5
Send Full-Disclosure mailing list submissions to
full-disclosure@...ts.grok.org.uk
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.grok.org.uk/mailman/listinfo/full-disclosure
or, via email, send a message with subject or body 'help' to
full-disclosure-request@...ts.grok.org.uk
You can reach the person managing the list at
full-disclosure-owner@...ts.grok.org.uk
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Full-Disclosure digest..."
Note to digest recipients - when replying to digest posts, please trim your post appropriately. Thank you.
Today's Topics:
1. [ MDVSA-2010:193 ] qt-creator (security@...driva.com)
2. [ MDVSA-2010:194 ] git (security@...driva.com)
3. WikiLeaks "underoing" (sic) scheduled maintenance (Harry Behrens)
4. [ANN] pinktrace-0.0.1 (Ali Polatel)
5. Fwd: xss in silverstripe (dave b)
6. Re: Multiple vulnerabilities in WordPress 2 and 3 (PsychoBilly)
7. Breaking .NET encryption with or without Padding Oracle
(Early Warning)
8. Re: the real stuxnet authors plz stand up (huj huj huj)
9. Re: WikiLeaks "underoing" (sic) scheduled maintenance
(huj huj huj)
----------------------------------------------------------------------
Message: 1
Date: Sun, 03 Oct 2010 14:29:00 +0200
From: security@...driva.com
Subject: [Full-disclosure] [ MDVSA-2010:193 ] qt-creator
To: full-disclosure@...ts.grok.org.uk
Message-ID: <E1P2Nga-0006EV-JN@...an.mandriva.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2010:193
http://www.mandriva.com/security/
_______________________________________________________________________
Package : qt-creator
Date : October 3, 2010
Affected: 2010.0, 2010.1
_______________________________________________________________________
Problem Description:
A vulnerability has been found in Qt Creator 2.0.0 and previous
versions. The vulnerability occurs because of an insecure manipulation
of a Unix environment variable by the qtcreator shell script. It
manifests by causing Qt or Qt Creator to attempt to load certain
library names from the current working directory (CVE-2010-3374).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3374
http://qt.nokia.com/about/news/security-announcement-qt-creator-2.0.0-for-desktop-platforms
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2010.0:
72f483e1687632ee9887b5742b72891d 2010.0/i586/libaggregation1-1.2.1-2.2mdv2010.0.i586.rpm
38ef2476d9ca746576549cd230fed498 2010.0/i586/libcplusplus1-1.2.1-2.2mdv2010.0.i586.rpm
33d7aa73bc3793f7327e5e2160409f4b 2010.0/i586/libextensionsystem1-1.2.1-2.2mdv2010.0.i586.rpm
6429fd08060935dbecf7f7bdec4d2160 2010.0/i586/libqtconcurrent1-1.2.1-2.2mdv2010.0.i586.rpm
029072ad2feb8299499a79f75bf4ae8e 2010.0/i586/libutils1-1.2.1-2.2mdv2010.0.i586.rpm
af66282a6100278935d3a2137af01522 2010.0/i586/qt-creator-1.2.1-2.2mdv2010.0.i586.rpm
617fccd89b2020320e4492364caed27c 2010.0/i586/qt-creator-doc-1.2.1-2.2mdv2010.0.i586.rpm
1a7f7c6820ac43102c30bf3c5ffa570c 2010.0/SRPMS/qt-creator-1.2.1-2.2mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64:
a2b277c9e816765850be2242dd725738 2010.0/x86_64/lib64aggregation1-1.2.1-2.2mdv2010.0.x86_64.rpm
553865d75cf73ac6c878b013dd7230eb 2010.0/x86_64/lib64cplusplus1-1.2.1-2.2mdv2010.0.x86_64.rpm
b4067d049b8333c6986eb7b7ae15bd92 2010.0/x86_64/lib64extensionsystem1-1.2.1-2.2mdv2010.0.x86_64.rpm
4edc6b295e3da81e798abf9fd7f29055 2010.0/x86_64/lib64qtconcurrent1-1.2.1-2.2mdv2010.0.x86_64.rpm
4513fa9422e50fc2766009cd0e36bef3 2010.0/x86_64/lib64utils1-1.2.1-2.2mdv2010.0.x86_64.rpm
75e44c0a21ee51a31723b8745f1dafca 2010.0/x86_64/qt-creator-1.2.1-2.2mdv2010.0.x86_64.rpm
f150dba6979ef40f976972f6acc75180 2010.0/x86_64/qt-creator-doc-1.2.1-2.2mdv2010.0.x86_64.rpm
1a7f7c6820ac43102c30bf3c5ffa570c 2010.0/SRPMS/qt-creator-1.2.1-2.2mdv2010.0.src.rpm
Mandriva Linux 2010.1:
127afd19d86e5e5fb75a9a9a98ceec10 2010.1/i586/qt-creator-1.3.1-3.2mdv2010.1.i586.rpm
2af40e3c8026a3cf2c2a363bac6f04c5 2010.1/i586/qt-creator-doc-1.3.1-3.2mdv2010.1.i586.rpm
4cd4b31b37f920c3c4e8c074c5d6e6d5 2010.1/SRPMS/qt-creator-1.3.1-3.2mdv2010.1.src.rpm
Mandriva Linux 2010.1/X86_64:
d36be9f4a84212098a5c18248a5f4465 2010.1/x86_64/qt-creator-1.3.1-3.2mdv2010.1.x86_64.rpm
911034c2b800c9021141242a56aae79a 2010.1/x86_64/qt-creator-doc-1.3.1-3.2mdv2010.1.x86_64.rpm
4cd4b31b37f920c3c4e8c074c5d6e6d5 2010.1/SRPMS/qt-creator-1.3.1-3.2mdv2010.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFMqEsRmqjQ0CJFipgRAm4BAJ0b7XnaZghX83QGkIWeI0h4/+AdbgCfVdIv
XmQcNcc6OmY0kXyBYjnudVs=
=YDKE
-----END PGP SIGNATURE-----
------------------------------
Message: 2
Date: Sun, 03 Oct 2010 21:37:00 +0200
From: security@...driva.com
Subject: [Full-disclosure] [ MDVSA-2010:194 ] git
To: full-disclosure@...ts.grok.org.uk
Message-ID: <E1P2UMm-0001Qv-Uq@...an.mandriva.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2010:194
http://www.mandriva.com/security/
_______________________________________________________________________
Package : git
Date : October 3, 2010
Affected: 2009.1, 2010.0, 2010.1, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in git:
Stack-based buffer overflow in the is_git_directory function in setup.c
in Git before 1.7.2.1 allows local users to gain privileges via a
long gitdir: field in a .git file in a working copy (CVE-2010-2542).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2542
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2009.1:
e36c30bb2efd1e37a798f18b2fe0409d 2009.1/i586/git-1.6.2.5-0.2mdv2009.1.i586.rpm
e24c5595f517896efc3937c3e6f67e3f 2009.1/i586/git-arch-1.6.2.5-0.2mdv2009.1.i586.rpm
fb822b181161f4896ce1d6dfdeb9bd15 2009.1/i586/git-core-1.6.2.5-0.2mdv2009.1.i586.rpm
4f7f7ce2826bbca4c2686ec17dc98646 2009.1/i586/git-core-oldies-1.6.2.5-0.2mdv2009.1.i586.rpm
1de9a3c640a8ab79b0f635c7f28d3566 2009.1/i586/git-cvs-1.6.2.5-0.2mdv2009.1.i586.rpm
1a15e8c4cf5dcf67305cd82955eb9180 2009.1/i586/git-email-1.6.2.5-0.2mdv2009.1.i586.rpm
bc58ceed787b7452d8a85180e44ef307 2009.1/i586/gitk-1.6.2.5-0.2mdv2009.1.i586.rpm
6a0e809737cee3fa4bd23575b6d5437a 2009.1/i586/git-svn-1.6.2.5-0.2mdv2009.1.i586.rpm
6dcf828363e99ab3dfe2b1539a095eb2 2009.1/i586/gitview-1.6.2.5-0.2mdv2009.1.i586.rpm
19f0de2a083f34955d6a85b591c8a82b 2009.1/i586/gitweb-1.6.2.5-0.2mdv2009.1.i586.rpm
729246da7e5812e3d8be48b66f6c96d2 2009.1/i586/libgit-devel-1.6.2.5-0.2mdv2009.1.i586.rpm
6fa5b0e90caeb83bad4405ca84c3a644 2009.1/i586/perl-Git-1.6.2.5-0.2mdv2009.1.i586.rpm
5c74a812d839adced666981b16008790 2009.1/SRPMS/git-1.6.2.5-0.2mdv2009.1.src.rpm
Mandriva Linux 2009.1/X86_64:
36a163e8dbf812a00f2774737d3db3e3 2009.1/x86_64/git-1.6.2.5-0.2mdv2009.1.x86_64.rpm
da62d78a1fd8cb3f148da045c98f8697 2009.1/x86_64/git-arch-1.6.2.5-0.2mdv2009.1.x86_64.rpm
8a944bf53721285cc9fe90fe80f20503 2009.1/x86_64/git-core-1.6.2.5-0.2mdv2009.1.x86_64.rpm
15ce468ebf23b2e6442da065addc0468 2009.1/x86_64/git-core-oldies-1.6.2.5-0.2mdv2009.1.x86_64.rpm
e3ba618e5516ee3e0527dd4f656e43be 2009.1/x86_64/git-cvs-1.6.2.5-0.2mdv2009.1.x86_64.rpm
6be37a10302a9267d186e626437f7fba 2009.1/x86_64/git-email-1.6.2.5-0.2mdv2009.1.x86_64.rpm
3ae3179b2d6601e99e63136e70d9661e 2009.1/x86_64/gitk-1.6.2.5-0.2mdv2009.1.x86_64.rpm
cc0f7c402dbd3e4fb3a89c69d7c4bbce 2009.1/x86_64/git-svn-1.6.2.5-0.2mdv2009.1.x86_64.rpm
d3995ffe7fad83d902a22d7b465dad33 2009.1/x86_64/gitview-1.6.2.5-0.2mdv2009.1.x86_64.rpm
5266e7b2e209a7a94c854903f1c3dfa6 2009.1/x86_64/gitweb-1.6.2.5-0.2mdv2009.1.x86_64.rpm
0097c72a5d29c16d7193ca7159826180 2009.1/x86_64/lib64git-devel-1.6.2.5-0.2mdv2009.1.x86_64.rpm
3bf7309d7ee46a7b6c17954ddae939aa 2009.1/x86_64/perl-Git-1.6.2.5-0.2mdv2009.1.x86_64.rpm
5c74a812d839adced666981b16008790 2009.1/SRPMS/git-1.6.2.5-0.2mdv2009.1.src.rpm
Mandriva Linux 2010.0:
05e69d2ef3f77fa187680647094becce 2010.0/i586/git-1.6.4.4-6.1mdv2010.0.i586.rpm
0a4073b71cf63d4edba0ff3b565a89ba 2010.0/i586/git-arch-1.6.4.4-6.1mdv2010.0.i586.rpm
caea32abfe0955cc7be5be2d49a69302 2010.0/i586/git-core-1.6.4.4-6.1mdv2010.0.i586.rpm
9af8db24c9ecde83e6e30542c1a429d3 2010.0/i586/git-core-oldies-1.6.4.4-6.1mdv2010.0.i586.rpm
9db0d8344eda9b00b2bf98c78fb923c3 2010.0/i586/git-cvs-1.6.4.4-6.1mdv2010.0.i586.rpm
f1075e86c19920e9d760899745d031f8 2010.0/i586/git-email-1.6.4.4-6.1mdv2010.0.i586.rpm
92457a4711ceb4c97250a78b541ed716 2010.0/i586/gitk-1.6.4.4-6.1mdv2010.0.i586.rpm
66063c99e6a26a5a4c93dbd956fd4ba3 2010.0/i586/git-prompt-1.6.4.4-6.1mdv2010.0.i586.rpm
f3970194c62eccef9b32fb3cab68b55a 2010.0/i586/git-svn-1.6.4.4-6.1mdv2010.0.i586.rpm
1c17e4705d33069f1776b25531048bda 2010.0/i586/gitview-1.6.4.4-6.1mdv2010.0.i586.rpm
9d361a0c3ad75a5c68affd14dcc7681b 2010.0/i586/gitweb-1.6.4.4-6.1mdv2010.0.i586.rpm
d739ac4c7012ebd56b6d401d545243fa 2010.0/i586/libgit-devel-1.6.4.4-6.1mdv2010.0.i586.rpm
d288543970e5dcd2268d6a7eb60305cc 2010.0/i586/perl-Git-1.6.4.4-6.1mdv2010.0.i586.rpm
47a9c9ea741437d1432ddd90e32b45e6 2010.0/SRPMS/git-1.6.4.4-6.1mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64:
cc3e19b3a6cf10ead6e5a74d478fc39e 2010.0/x86_64/git-1.6.4.4-6.1mdv2010.0.x86_64.rpm
690b28356d34cc1da502f04dda722ea5 2010.0/x86_64/git-arch-1.6.4.4-6.1mdv2010.0.x86_64.rpm
848b95d3e8d2755d7e9bc885600c16b2 2010.0/x86_64/git-core-1.6.4.4-6.1mdv2010.0.x86_64.rpm
12e3fc6006f1a688da619ed304ed703f 2010.0/x86_64/git-core-oldies-1.6.4.4-6.1mdv2010.0.x86_64.rpm
1079c63990148140641dfc728f0f95ae 2010.0/x86_64/git-cvs-1.6.4.4-6.1mdv2010.0.x86_64.rpm
32a648d0a7daa28644f96f04d05b3f96 2010.0/x86_64/git-email-1.6.4.4-6.1mdv2010.0.x86_64.rpm
e61e2dafa93e4c6843aab8b96f2ff02c 2010.0/x86_64/gitk-1.6.4.4-6.1mdv2010.0.x86_64.rpm
39e12217b32a2cc6c553142c62f01ef3 2010.0/x86_64/git-prompt-1.6.4.4-6.1mdv2010.0.x86_64.rpm
5b4e71e02e815f2c63b497836d1f1e7c 2010.0/x86_64/git-svn-1.6.4.4-6.1mdv2010.0.x86_64.rpm
4d1408e86a37909ce3af9d534d791eb1 2010.0/x86_64/gitview-1.6.4.4-6.1mdv2010.0.x86_64.rpm
7a1f7fdeb72a855f1cf62b5dc2f821a6 2010.0/x86_64/gitweb-1.6.4.4-6.1mdv2010.0.x86_64.rpm
0e43bd01aba87d2e1157307a979e920b 2010.0/x86_64/lib64git-devel-1.6.4.4-6.1mdv2010.0.x86_64.rpm
be775dcd8a82cd22852aa949864f6b20 2010.0/x86_64/perl-Git-1.6.4.4-6.1mdv2010.0.x86_64.rpm
47a9c9ea741437d1432ddd90e32b45e6 2010.0/SRPMS/git-1.6.4.4-6.1mdv2010.0.src.rpm
Mandriva Linux 2010.1:
9a53fe0eafe2b286effe34e0386296f5 2010.1/i586/git-1.7.1-1.1mdv2010.1.i586.rpm
366105f56483fda6e465af3b48886a64 2010.1/i586/git-arch-1.7.1-1.1mdv2010.1.i586.rpm
7f4d4f93b1fc0f582ea976ab3948176b 2010.1/i586/git-core-1.7.1-1.1mdv2010.1.i586.rpm
3d621a1105e35c473f44474fb429cd4f 2010.1/i586/git-core-oldies-1.7.1-1.1mdv2010.1.i586.rpm
153c7334f1600e7b301ea88a596ecf87 2010.1/i586/git-cvs-1.7.1-1.1mdv2010.1.i586.rpm
03f2cb0a820f848775798aecdff73d16 2010.1/i586/git-email-1.7.1-1.1mdv2010.1.i586.rpm
1cf070ea84d4266d43dbc9cd1d94da1f 2010.1/i586/gitk-1.7.1-1.1mdv2010.1.i586.rpm
09d4b394f592311256e9d1524a7b213a 2010.1/i586/git-prompt-1.7.1-1.1mdv2010.1.i586.rpm
17253d2dea0e8e9ffd39729d17f94605 2010.1/i586/git-svn-1.7.1-1.1mdv2010.1.i586.rpm
c55070264354761a42ef081504dba023 2010.1/i586/gitview-1.7.1-1.1mdv2010.1.i586.rpm
4d4b279155246cf2c6dd5c3994341c76 2010.1/i586/gitweb-1.7.1-1.1mdv2010.1.i586.rpm
20b5523db533068c74317c6ab6d1682f 2010.1/i586/libgit-devel-1.7.1-1.1mdv2010.1.i586.rpm
0fdeeed89128c15726fc11d1c32f35e2 2010.1/i586/perl-Git-1.7.1-1.1mdv2010.1.i586.rpm
94b914ed0817c3260deff34d1176850e 2010.1/i586/python-git-1.7.1-1.1mdv2010.1.i586.rpm
269d848f0be754565fcd2ae2fd402244 2010.1/SRPMS/git-1.7.1-1.1mdv2010.1.src.rpm
Mandriva Linux 2010.1/X86_64:
c30305b2b65f3be12243bf6201f58db6 2010.1/x86_64/git-1.7.1-1.1mdv2010.1.x86_64.rpm
abf1681f048980a84a31be90c0e0c1c9 2010.1/x86_64/git-arch-1.7.1-1.1mdv2010.1.x86_64.rpm
8fc426f9885a16997e738d932bc178ff 2010.1/x86_64/git-core-1.7.1-1.1mdv2010.1.x86_64.rpm
53bf857343b026bd3119c8f9f5f517e8 2010.1/x86_64/git-core-oldies-1.7.1-1.1mdv2010.1.x86_64.rpm
d79af9e7c052afd3cfb86ba435d769ea 2010.1/x86_64/git-cvs-1.7.1-1.1mdv2010.1.x86_64.rpm
e060edb60fbbdd430378449a8bf877a0 2010.1/x86_64/git-email-1.7.1-1.1mdv2010.1.x86_64.rpm
2b3ee4007d2e770449a7301a4d16507e 2010.1/x86_64/gitk-1.7.1-1.1mdv2010.1.x86_64.rpm
73406e43466413d30c34087103bfc3c3 2010.1/x86_64/git-prompt-1.7.1-1.1mdv2010.1.x86_64.rpm
697df1362b4867550537f1374bdc228e 2010.1/x86_64/git-svn-1.7.1-1.1mdv2010.1.x86_64.rpm
b58f8242b1d54c0653fb90e79bb4c221 2010.1/x86_64/gitview-1.7.1-1.1mdv2010.1.x86_64.rpm
c0c684337ee3d11cb068ff9d52be2926 2010.1/x86_64/gitweb-1.7.1-1.1mdv2010.1.x86_64.rpm
800ba00449a578960c97d567e1803977 2010.1/x86_64/lib64git-devel-1.7.1-1.1mdv2010.1.x86_64.rpm
8bfd7f8c8329f963b04e2afe87cb4bd4 2010.1/x86_64/perl-Git-1.7.1-1.1mdv2010.1.x86_64.rpm
7fa2e372949ed54ba0784726ef4dd78b 2010.1/x86_64/python-git-1.7.1-1.1mdv2010.1.x86_64.rpm
269d848f0be754565fcd2ae2fd402244 2010.1/SRPMS/git-1.7.1-1.1mdv2010.1.src.rpm
Mandriva Enterprise Server 5:
da9042ce466cc88308c8da002a9bc22e mes5/i586/git-1.6.0.6-0.2mdvmes5.1.i586.rpm
1e1238eae3902d55c969f43d18682b60 mes5/i586/git-arch-1.6.0.6-0.2mdvmes5.1.i586.rpm
74828248e38cb3f8bb8c4564933bd451 mes5/i586/git-core-1.6.0.6-0.2mdvmes5.1.i586.rpm
9ca3cd9673c7ad38e30c6df900ec5147 mes5/i586/git-core-oldies-1.6.0.6-0.2mdvmes5.1.i586.rpm
54e7e0ebad40973ca53bcf8d2f822bf4 mes5/i586/git-cvs-1.6.0.6-0.2mdvmes5.1.i586.rpm
a0757a10b1566427aad43ab0bcd34188 mes5/i586/git-email-1.6.0.6-0.2mdvmes5.1.i586.rpm
6c4e5f05a0ce18b8b0a3fa2454fc7e2d mes5/i586/gitk-1.6.0.6-0.2mdvmes5.1.i586.rpm
80bf65bdd9f5eea47e93757152d5d0e4 mes5/i586/git-svn-1.6.0.6-0.2mdvmes5.1.i586.rpm
78e93b557075a4eeaf77065730d54efd mes5/i586/gitview-1.6.0.6-0.2mdvmes5.1.i586.rpm
750fb551951a21c5118b87b3278c32ed mes5/i586/gitweb-1.6.0.6-0.2mdvmes5.1.i586.rpm
a85dca1ed2756d1d0d12a8d211b2bdb9 mes5/i586/libgit-devel-1.6.0.6-0.2mdvmes5.1.i586.rpm
86e2d91045b53f684988c8a838a2c8e7 mes5/i586/perl-Git-1.6.0.6-0.2mdvmes5.1.i586.rpm
4fe847b83f07ab8d0e11290352dc22f2 mes5/SRPMS/git-1.6.0.6-0.2mdvmes5.1.src.rpm
Mandriva Enterprise Server 5/X86_64:
7c9097482d702eb71d58ab4c85ee0807 mes5/x86_64/git-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
20a1b3191f9eabd8664723293841203e mes5/x86_64/git-arch-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
660b37a71c0aac0051088545a2f77f06 mes5/x86_64/git-core-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
39acbb3e9873ba07a1e587da34195c68 mes5/x86_64/git-core-oldies-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
646464b83ad39c5ad34a6bbe4f6b225d mes5/x86_64/git-cvs-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
5f488aaa40399af4025670e5d9a49c57 mes5/x86_64/git-email-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
5b505b16edcc9b227784dd66e205190e mes5/x86_64/gitk-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
0cb95524e359a89842ee99eb20dba0cc mes5/x86_64/git-svn-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
c19be84b13166ceba8a6ac502cff9590 mes5/x86_64/gitview-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
99330e300c41df8e6966520bbb2ef791 mes5/x86_64/gitweb-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
4978b265158ae0e11eb3086ef5532b5a mes5/x86_64/lib64git-devel-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
a5fda12a1c57745a86d1e77dc24151f8 mes5/x86_64/perl-Git-1.6.0.6-0.2mdvmes5.1.x86_64.rpm
4fe847b83f07ab8d0e11290352dc22f2 mes5/SRPMS/git-1.6.0.6-0.2mdvmes5.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFMqKzEmqjQ0CJFipgRAmwVAJ9o/Om4HDJD0k3Af6A7IiU9h8DM7QCfQtYx
LG4Q+Zdpo8DNb9o50S6GXwg=
=hz7X
-----END PGP SIGNATURE-----
------------------------------
Message: 3
Date: Sun, 03 Oct 2010 17:07:23 +0200
From: Harry Behrens <harry@...rens.com>
Subject: [Full-disclosure] WikiLeaks "underoing" (sic) scheduled
maintenance
To: full-disclosure@...ts.grok.org.uk
Message-ID: <4CA89C2B.6040303@...rens.com>
Content-Type: text/plain; charset=ISO-8859-15; format=flowed
for 5 days and nothing about this to be found on google.
Does anybody have an idea what is happening here - it does smell
slightly fishy...
-h
------------------------------
Message: 4
Date: Sun, 03 Oct 2010 16:39:03 +0300
From: Ali Polatel <alip@...erbo.org>
Subject: [Full-disclosure] [ANN] pinktrace-0.0.1
To: full-disclosure@...ts.grok.org.uk
Message-ID: <87tyl35rbc.fsf@...atren.ev>
Content-Type: text/plain; charset="utf-8"
Hey everyone,
I'd like to announce the first public release of pinktrace.
Download
========
tarball: http://dev.exherbo.org/~alip/pinktrace/release/pinktrace-0.0.1.tar.bz2
sha1sum: http://dev.exherbo.org/~alip/pinktrace/release/pinktrace-0.0.1.tar.bz2.sha1sum
sign: http://dev.exherbo.org/~alip/pinktrace/release/pinktrace-0.0.1.tar.bz2.asc
About
=====
PinkTrace is a ptrace() wrapper library.
Overview
========
PinkTrace is a lightweight C99 library that eases the writing of tracing
applications. It consists of the following parts:
* Wrappers around different ptrace() requests.
* An API for decoding arguments (strings, socket addresses, ?)
* An experimental API for encoding arguments.
License
=======
PinkTrace is licensed under the BSD-3 license.
Supported Platforms
===================
FreeBSD and Linux operating systems are supported.
Supported architectures are:
- x86
- x86_64
- ia64 (Linux only)
- ppc (Linux only)
- ppc64 (Linux only)
- arm (Linux only)
Documentation
=============
API: http://dev.exherbo.org/~alip/pinktrace/api/c
Python bindings: http://dev.exherbo.org/~alip/pinktrace/api/python
Ruby bindings: http://dev.exherbo.org/~alip/pinktrace/api/ruby
Examples
========
There are examples showing how to use the various parts of the library:
http://dev.exherbo.org/~alip/pinktrace/#examples
Contribute
==========
Contributions are welcome.
Clone git://github.com/alip/pinktrace.git.
Format patches are preferred. Either send a mail to me or poke me on IRC.
My personal e-mail address is alip@...erbo.org
I'm available on IRC as alip on Freenode and OFTC.
Join #sydbox on Freenode for pinktrace related questions.
--
Regards,
Ali Polatel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20101003/3b3c9651/attachment-0001.bin
------------------------------
Message: 5
Date: Mon, 4 Oct 2010 14:03:04 +1100
From: dave b <db.pub.mail@...il.com>
Subject: [Full-disclosure] Fwd: xss in silverstripe
To: full-disclosure@...ts.grok.org.uk
Message-ID:
<AANLkTikLtnJry6X20E3O2fXJBSBA3bH=OK4sRWGLeZNv@...l.gmail.com>
Content-Type: text/plain; charset=UTF-8
Bugtraq seem to be having problems :/ (this is the only reason I sent
this to full disclosure I don't like wasting people's time with xss on
this list).
---------- Forwarded message ----------
From: dave b <db.pub.mail@...il.com>
Date: 4 October 2010 13:48
Subject: xss in silverstripe
To: bugtraq@...urityfocus.com
Look I know xss are lame but silverstripe is vulnerable ...
http://www.silverstripe.com/blog/tag/%20%3Cinput%20type=%22text%22%20AUTOFOCUS%20onfocus=alert%281%29%3E
I love html5!
--
The better part of valor is discretion. ? ? ? ? -- William
Shakespeare, "Henry IV"
------------------------------
Message: 6
Date: Mon, 04 Oct 2010 10:12:06 +0200
From: PsychoBilly <zpamh0l3@...il.com>
Subject: Re: [Full-disclosure] Multiple vulnerabilities in WordPress 2
and 3
To: full-disclosure@...ts.grok.org.uk
Message-ID: <4CA98C56.1030209@...il.com>
Content-Type: text/plain; charset=windows-1251; format=flowed
We all know you have to make a living
but
For all these disclosures it's needed to have a brain.
************************
Cluster #[[ MustDie ]] possibly emitted,
> For all these attacks it's needed to have access to admin account
------------------------------
Message: 7
Date: Mon, 4 Oct 2010 10:21:08 +0200
From: Early Warning <seclist@...dedsecurity.com>
Subject: [Full-disclosure] Breaking .NET encryption with or without
Padding Oracle
To: full-disclosure@...ts.grok.org.uk
Message-ID:
<AANLkTimB8ZfhngU+rRjctR-UUOjYDFiP2VkNj5jcJxpX@...l.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1
Dear list,
Since Microsoft official fix is out, we published full details about
"ScriptResource.axd" vulnerability in framework 3.5 sp1 and above
which leads to arbitrary file disclosure in the virtual path.
In addition we have included also details about the "T" exploit
that can be used to circumvent initial Microsoft workaround.
For more information:
http://blog.mindedsecurity.com/2010/10/breaking-net-encryption-with-or-without.html
Regards,
Giorgio Fedon
Minded Security Research Team
www.mindedsecurity.com
------------------------------
Message: 8
Date: Mon, 4 Oct 2010 12:02:21 +0200
From: huj huj huj <datskihuj@...il.com>
Subject: Re: [Full-disclosure] the real stuxnet authors plz stand up
To: coderman <coderman@...il.com>
Cc: Full Disclosure <full-disclosure@...ts.grok.org.uk>
Message-ID:
<AANLkTinmfxs3uTdS0Nmo4BaVv59AE7LtteqRLKRo1i_t@...l.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"
coderman its puff puff pass.. you smoked the whole thing!
2010/9/25 coderman <coderman@...il.com>
> On Fri, Sep 24, 2010 at 11:48 PM, Kenneth Voort <kenneth@...rt.ca> wrote:
> > Get real...
>
> i did not say bushehr was not impacted; a side effect of the re-use of
> same real-time PLC workflow controller there resulted in cluster fuck
> and non-operation.
>
> however, the target was centrifuges and in this regard, it worked
> perfectly: the only outward signs of interest at natanz and qom while
> affected was then un-explained 2x to 4x under-yield from the
> cascades... the running total spinning looked nice though - steady
> progress! heh
>
> in any case, you confuse me with someone who has something to say.
> really EOT this time...
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20101004/a352a5bf/attachment-0001.html
------------------------------
Message: 9
Date: Mon, 4 Oct 2010 12:31:36 +0200
From: huj huj huj <datskihuj@...il.com>
Subject: Re: [Full-disclosure] WikiLeaks "underoing" (sic) scheduled
maintenance
To: Harry Behrens <harry@...rens.com>
Cc: full-disclosure@...ts.grok.org.uk
Message-ID:
<AANLkTim+hZWbUNzcJtf8G=a0Xe2nKNt2usEpjdVBuJdS@...l.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"
probably just assange throwing a tantrum
2010/10/3 Harry Behrens <harry@...rens.com>
> for 5 days and nothing about this to be found on google.
>
> Does anybody have an idea what is happening here - it does smell
> slightly fishy...
>
> -h
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20101004/5325aae4/attachment-0001.html
------------------------------
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
End of Full-Disclosure Digest, Vol 68, Issue 5
**********************************************
CONFIDENTIALITY NOTICE: This email communication and any attachments may contain confidential
and privileged information for the use of the designated recipients named above. If you are
not the intended recipient, you are hereby notified that you have received this communication
in error and that any review, disclosure, dissemination, distribution or copying of it or its
contents is prohibited. If you have received this communication in error, please reply to the
sender immediately or by telephone at (617) 426-0600 and destroy all copies of this communication
and any attachments. For further information regarding Commonwealth Care Alliance's privacy policy,
please visit our Internet web site at http://www.commonwealthcare.org.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists