Displaying 20 results from an estimated 200 matches similar to: "Linux IP fragment overlap bug (fwd)"
1998 Jul 19
4
IMAPD fix for RH
You probably know this already, but the following notice appeared to bugtraq.
As a side note the protocol on bugtraq seems to be designed to make a fix
available before the announcement by providing one yourself or giving the
maintainer a week's advance warning (M$ gets a lot longer warning and *still*
fails to fix the bugs before bugtraq knows).
Having said that M$ insists on allowing me
2010 Jul 14
2
[LLVMdev] Figuring out the parameters of the Call Instruction
Hi,
I am trying to figure out how to read arguments of a call instruction.
I had few questions based on that
I have the following C Code
1 #include <stdio.h>
2
3 struct my_struct
4 {
5 int a;
6 int b;
7 };
8
9 struct my_struct abc;
10 void p_ptr ( unsigned long j)
11 {
12 printf ( "%lx \n", j );
13 }
14
15 void struct_ptr ( struct my_struct *
2010 Jul 15
0
[LLVMdev] Figuring out the parameters of the Call Instruction
Hi Shankha,
> 24 p_ptr ((unsigned long)&abc);
> call void @p_ptr(i64 ptrtoint (%struct.my_struct* @abc to i64))
> nounwind, !dbg !31
>
> Q.1 At line no 24 I try to read the address of global variable abc.
> The address is type casted
> from struct * to int * for which ptrtoint.
I guess you mean "is type casted from struct * to unsigned
2010 Jul 15
1
[LLVMdev] Figuring out the parameters of the Call Instruction
Hi Duncan,
Thanks for pointing out my mistake. I will reword my questions.
//C code
int var1; //global
int a, b;
foo(a, b);
bar(c);
generates following
//LLVM IR
%1 = load a;
%2 = load b;
call foo(%1, %2)
call bar(@var1)
CallInst.getOperand(1).getNameStr() on foo, returns null,
but on bar returns var1.
Similarly, for
call void @p_ptr(i64 ptrtoint (%struct.my_struct* @abc to i64))
nounwind,
1997 Mar 24
1
More sendmail problems... Partition your disks!
This is yet-another reason to _partition_ your disks. Of course hard links
do not work accross filesystems. Even thought it is a pain in the neck to do
when installing your operating system, think about separating critical
system files from non-critical and non-system files from system files. I
would say that the following layout is a good place to start:
/
/usr (nosuid,nodev,ro)
/usr/local
1997 May 26
1
FYI: Possible information disclosure in cfingerd.
Hi,
This is FYI. Lets not start discussion on a topic of "my fingerd is
better than yours".
Alex
------- Forwarded Message
Return-Path: owner-bugtraq@NETSPACE.ORG
Message-ID: <199705240145.WAA11413@morcego.linkway.com.br>
Date: Fri, 23 May 1997 22:45:04 -0300
Reply-To: Rodrigo Barbosa <rodrigob@MORCEGO.LINKWAY.COM.BR>
Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
1998 May 17
0
Fw: simple kde exploit fix
And, here''s a fix.
-----Original Message-----
From: David Zhao <dzhao@LURK.KELLOGG.NWU.EDU>
To: BUGTRAQ@NETSPACE.ORG <BUGTRAQ@NETSPACE.ORG>
Date: Sunday, May 17, 1998 3:00 PM
Subject: simple kde exploit fix
>in kdebase/kscreensaver/kscreensave.cpp:
>
>change:
>line 18: strcpy( buffer, getenv("HOME") );
> to
>
1998 Feb 25
0
Quake 2 Linux 3.13 (and lower) allow users to read arbitrary files [Forwarded e-mail from kevingeo@CRUZIO.COM]
------- start of forwarded message (RFC 934 encapsulation) -------
From: kevingeo@CRUZIO.COM
Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
To: BUGTRAQ@NETSPACE.ORG
Subject: Quake 2 Linux 3.13 (and lower) allow users to read arbitrary files
Date: Wed, 25 Feb 1998 05:49:58 -0500
Reply-To: kevingeo@CRUZIO.COM
Vulnerable:
Everyone who followed the installation instructions and made Quake2
2014 Jun 20
3
[Bug 963] New: nfq_udp_get_payload and nfq_udp_get_payload_len return wrong results
https://bugzilla.netfilter.org/show_bug.cgi?id=963
Summary: nfq_udp_get_payload and nfq_udp_get_payload_len return
wrong results
Product: libnetfilter_queue
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: libnetfilter_queue
1996 Dec 23
2
Buffer overflow in Linux''s login program [Forwarded e-mail from Joe Zbiciak]
------- start of forwarded message (RFC 934 encapsulation) -------
From: Joe Zbiciak <im14u2c@cegt201.bradley.edu>
Approved: alex@bach.cis.temple.edu
Sender: Bugtraq List <BUGTRAQ@netspace.org>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org>
Subject: Buffer overflow in Linux''s login program
Date: Sun, 22 Dec 1996 09:27:24 -0600
Reply-To: Joe Zbiciak
1997 Jul 29
0
Fwd: Buffer Overrun in ruserpass() in MH and NMH (fwd)
------- =_aaaaaaaaaa0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <14008.870179829.1@erehwon.bmc.com>
See attached. Red Hat Linux package mh-6.8.3-13.i386.rpm installs the
inc and msgchk programs as follows:
-rwsr-sr-x- root mail 72628 Oct 17 16:57 /usr/bin/mh/inc
-rwsr-xr-x- root root 52536 Oct 17 16:57 /usr/bin/mh/msgchk
Hal
-------
1997 Nov 13
0
Linux F00F Patch [Forwarded e-mail from Aleph One]
[mod: The first message would''ve been rejected on the grounds "no
security related information", but it gives ME a warm feeling too, so
I''m allowing it to piggyback on the announcement of the "fix". Note
that Linux-2.1.63 simply implements a fix for the problem, instead of
applying this fix, upgrading to 2.1.63 might be an option for you.
Linus indicated that
1997 May 11
4
[Linux UID/GID ''Feature'']
I picked up the following from Bugtraq.
-----Forwarded message from David Phillips <phillips@PCISYS.NET>-----
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <01BC5D8D.679DD4A0@frank56.pcisys.net>
Date: Sat, 10 May 1997 21:56:05 -0600
Reply-To: David Phillips <phillips@PCISYS.NET>
Sender: Bugtraq List
2003 May 22
0
[PATCH 2.5.69 1/3] remove ipconfig support from the kernel
This patch removes IP autoconfiguration (CONFIG_IP_PNP and friends)
support from the kernel, and ensures that using NFS as the root
filesystem (CONFIG_NFS_ROOT) will no longer work.
b/arch/alpha/defconfig | 1
b/arch/arm/def-configs/a5k | 1
b/arch/arm/def-configs/adi_evb | 4
b/arch/arm/def-configs/adsbitsy | 4
1999 Mar 25
0
(Fwd) DoS for Linux 2.1.89 - 2.2.3: 0 length fragment bug
Pulled from Bugtraq.
Dan
____________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L
Fermi National Accelerator Lab | email: yocum@fnal.gov /V\ I
P.O. Box 500 | WWW: www-oss.fnal.gov/~yocum/ // \\ N
Batavia, IL
1999 Jun 11
0
ipop2d buffer overflow fix (fwd)
[mod: In addition to this, Jon points us to:
http://www.redhat.com/corp/support/errata/rh52-errata-general.html#imap
for the official fix from Red Hat. -- REW]
---------- Forwarded message ----------
From: dumped <dumped@SEKURE.ORG>
Subject: ipop2d buffer overflow fix
Resent-Subject: ipop2d buffer overflow fix
Date: Thu, 3 Jun 1999 17:29:05 -0300
Resent-Date: Fri, 4 Jun 1999 00:52:49
1999 Mar 29
0
Re: ADM Worm. Worm for Linux x86 found in wild. (fwd)
Hi,
some more info on the previous admw0rm alert.
Fwd'd from BugTraq
Greetings,
Jan-Philip Velders
---------- Forwarded message ----------
Date: Fri, 26 Mar 1999 21:17:40 +0100
From: Mixter <mixter@HOME.POPMAIL.COM>
To: BUGTRAQ@NETSPACE.ORG
Subject: Re: ADM Worm. Worm for Linux x86 found in wild.
The "ADM w0rm" is public and can be found at:
1999 Feb 22
0
Forw: RedHat sysklogd vulnerability
Another from Bugtraq. I've also forwarded this one on to our contact at Red
Hat (Stephen Smoogen) and he tells me it's in their QA currently.
Dan
_______________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L
Fermi National Accelerator
1998 Oct 22
0
[Fwd: SVGATextMode 1.8 /tmp race]
Just got this on bugtraq...
Balu
-------- Original Message --------
Subject: SVGATextMode 1.8 /tmp race
Date: Thu, 21 Oct 1999 23:01:34 +0300
From: Adrian Voinea <root@DEATH.GDS.RO>
Reply-To: Adrian Voinea <root@DEATH.GDS.RO>
To: BUGTRAQ@NETSPACE.ORG
Hello,
savetextmode, a utility that comes with SVGATextMode 1.8, saves the text
mode data in /tmp, in two files with the mode 644:
1998 Jul 30
0
who (fwd)
Hi *,
fwd from bugtraq
Greetings,
Jan-Philip Velders
<gvelders@jvelders.tn.tudelft.nl>
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
| Nederlandse Linux GebruikersGroep : http://www.nllgg.nl |
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
---------- Forwarded message ----------
Date: Tue, 28 Jul 1998 20:27:21 +0200
From: Paul Boehm <paul@BOEHM.ORG>
To: