Remove eoan, set focal as default release. Reflect hirsute release, add impish, remove xenial. Reflect impish release, add jammy, remove groovy. News Reflect jammy release, add kinetic, remove hirsute. Packages that contain files whose names contain the keyword Packages that contain files whose names end with the keyword Packages that contain files named like this You can also get a full list of files in a given package. This search engine allows you to search the contents of Ubuntu distributions for any files (or just parts of file names) that are part of packages. : name for the search on source package names.There are shortcuts for some searches available: Package names only Descriptions Source package names There is also a list of packages recently added to kinetic. For the stable distribution (squeeze), these problems have been fixed in version 3.6.2.0-4.4.This site provides you with information about all the packages available in the Ubuntu Package archive. Users of bugzilla on lenny are strongly advised to upgrade to the version in the squeeze distribution. For the oldstable distribution (lenny), it has not been practical to backport patches to fix these bugs. By crafting the URL when creating or editing a bug, it was possible to guess if a group existed or not, even for groups which weren't used in bugs and so which were supposed to remain confidential. CVE-2011-2380, CVE-2011-2979 Normally, a group name is confidential and is only visible to members of the group, and to non-members if the group is used in bugs. This alternate host is now also used when viewing patches in 'Raw Unified' mode because Internet Explorer 8 and older, and Safari before 5.0.6 do content sniffing, which could lead to the execution of malicious code. CVE-2011-2379 Bugzilla uses an alternate host for attachments when viewing them in raw format to prevent cross-site scripting attacks. CVE-2011-2381 For flagmails only, attachment descriptions with a newline in them could lead to the injection of crafted headers in email notifications when an attachment flag is edited. This means that the user would not be notified that his account had its email address changed by the attacker. If an attacker has access to the session of another user (for example, if that user left their browser window open in a public place), the attacker could alter this field to cause the email-change notification to go to their own address. CVE-2011-2978 When a user changes his email address, Bugzilla trusts a user-modifiable field for obtaining the current e-mail address to send a confirmation message to. Most of these issues are not as serious as previous CSRF vulnerabilities. CVE-2011-0046 Various pages were vulnerable to Cross-Site Request Forgery attacks. CVE-2010-4568 It was possible for a user to gain unauthorized access to any Bugzilla account in a very short amount of time (short enough that the attack is highly effective). Also, 'javascript:' and'data:' links were always shown as clickable to logged-out users. It was possible to bypass this protection by adding spaces into the URL in places that Bugzilla did not expect them. However, it does not make 'javascript:' and 'data:' URLs into clickable links, to protect against cross-site scripting attacks or other attacks. CVE-2010-4567, CVE-2011-0048 Bugzilla has a 'URL' field that can contain several types of URL, including 'javascript:' and 'data:' URLs. CVE-2010-4572 By inserting particular strings into certain URLs, it was possible to inject both headers and content to any browser. Description Several vulnerabilities were discovered in Bugzilla, a web-based bug tracking system. Synopsis The remote Debian host is missing a security-related update.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |