search for: expoit

Displaying 7 results from an estimated 7 matches for "expoit".

Did you mean: exploit
2017 Feb 02
0
Serious attack vector on pkcheck ignored by Red Hat
...your existing bug reports is spent discussing a non-issue. If you want this issue to be taken seriously, I have a couple of pointers: First, drop the bug reports that have been closed. Those tickets are now convoluted and clouded by misguided discussion of a bug in pkcheck.c, which isn't expoitable. Continued arguing in those bug reports will be counter-productive. Open a new bug report and focus on this patch, exclusively: https://cgit.freedesktop.org/polkit/commit/src/programs/pkexec.c?id=6c992bc8aefa195a41eaa41c07f46f17de18e25c The upstream developer has disallowed multiple --user s...
2002 Jul 30
1
OpenSSL Security Advisory [30 July 2002]
Hi, FYI - don't sue me for posting this here - I know, everyone who needs this info *should* have it already, but maybe not ;-) Kind regards, B. Courtin -- OpenSSL Security Advisory [30 July 2002] This advisory consists of two independent advisories, merged, and is an official OpenSSL advisory. Advisory 1 ========== A.L. Digital Ltd and The Bunker (http://www.thebunker.net/) are
2019 Mar 09
2
[Bug 13827] New: despite --copy-unsafe-links, rsync does not copy the referent of symlinks that point one level outside the copied tree
...monstrates two other cases where the checks work as intended. The problem appears to be an off-by-one error in a check. Accessing things outside the copied tree through a symlink is probably a security problem. However, the restriction to only one directory level too far makes it more difficult to expoit. 1) Tested on Lubuntu 18.04.1 LTS 2) rsync version 3.1.2, protocol version 31 (The most current version of rsync is 3.1.3. But its release notes do not mention this bug to be fixed.) The change & release notes of Lubuntu 18.04.1 do not mention rsync. The bug tracker Ubuntu Launchpad does not...
2017 Feb 02
3
Serious attack vector on pkcheck ignored by Red Hat
On Thu, 2017-02-02 at 07:16 -0800, Gordon Messmer wrote: > On 02/02/2017 06:51 AM, Leonard den Ottolander wrote: > > pkcheck might not be directly vulnerable. However, pkexec is. > > > If that's so, why are you supplying patches to pkcheck rather than > fixing pkexec? The patch has a fix for three memory leaks. One memory leak that allows heap spraying in pkexec.c that
2003 Dec 02
2
model of fish over exploitation
Dear all, I have a serious problem to solve my model. I study over exploitation of fish in the bay of biscay (france). I know only the level of catch and the fishing effort (see data below) by year. My model is composed by the following equations: * the growth function Gt(St) = r*St*(1-St/sbar) with Gt the growth of each period t r intrinsec growth of the stock sbar carriyng capacity of the
1998 May 19
7
Bind Overrun Bug and Linux
...hat people DO get bitten after a bugwarning has gone out on linux-security..... -- REW] -----BEGIN PGP SIGNED MESSAGE----- Content-Type: text/plain; charset=us-ascii Has anyone been hit with the Bind Inverse Query Buffer Overrun on their Linux servers? We have had 3 servers attacked using this expoit and all of the machines had several binaries replaced with trojan programs. Below is the cert advisory for the exploit; but if anyone needs details under Linux of what happens and how to fix/ protect your servers, mail me. CERT* Advisory CA-98.05 Original issue date: April 08, 1998 Topic: Multi...
1997 Jan 29
5
evidence/timelines that show linux is "more secure"
I''m looking for some evidence, backup up with dates and references, that shows that the Linux community responds to security problems more quickly than other OS vendors, and thus might be considered "more secure". A number of fairly high profile corporations are starting to look for such information as they consider Linux as an alternative solution to other UNIXes. Something