Displaying 7 results from an estimated 7 matches for "expoitable".
Did you mean:
exploitable
2017 Feb 02
0
Serious attack vector on pkcheck ignored by Red Hat
...your
existing bug reports is spent discussing a non-issue.
If you want this issue to be taken seriously, I have a couple of
pointers: First, drop the bug reports that have been closed. Those
tickets are now convoluted and clouded by misguided discussion of a bug
in pkcheck.c, which isn't expoitable. Continued arguing in those bug
reports will be counter-productive.
Open a new bug report and focus on this patch, exclusively:
https://cgit.freedesktop.org/polkit/commit/src/programs/pkexec.c?id=6c992bc8aefa195a41eaa41c07f46f17de18e25c
The upstream developer has disallowed multiple --user speci...
2002 Jul 30
1
OpenSSL Security Advisory [30 July 2002]
Hi,
FYI - don't sue me for posting this here - I know, everyone who needs this info *should* have it already, but maybe not ;-)
Kind regards,
B. Courtin
--
OpenSSL Security Advisory [30 July 2002]
This advisory consists of two independent advisories, merged, and is
an official OpenSSL advisory.
Advisory 1
==========
A.L. Digital Ltd and The Bunker (http://www.thebunker.net/) are
2019 Mar 09
2
[Bug 13827] New: despite --copy-unsafe-links, rsync does not copy the referent of symlinks that point one level outside the copied tree
https://bugzilla.samba.org/show_bug.cgi?id=13827
Bug ID: 13827
Summary: despite --copy-unsafe-links, rsync does not copy the
referent of symlinks that point one level outside the
copied tree
Product: rsync
Version: 3.1.3
Hardware: All
OS: All
Status: NEW
Severity:
2017 Feb 02
3
Serious attack vector on pkcheck ignored by Red Hat
On Thu, 2017-02-02 at 07:16 -0800, Gordon Messmer wrote:
> On 02/02/2017 06:51 AM, Leonard den Ottolander wrote:
> > pkcheck might not be directly vulnerable. However, pkexec is.
>
>
> If that's so, why are you supplying patches to pkcheck rather than
> fixing pkexec?
The patch has a fix for three memory leaks. One memory leak that allows
heap spraying in pkexec.c that
2003 Dec 02
2
model of fish over exploitation
Dear all,
I have a serious problem to solve my model. I study over exploitation of
fish in the bay of biscay (france). I know only the level of catch and
the fishing effort (see data below) by year.
My model is composed by the following equations:
* the growth function
Gt(St) = r*St*(1-St/sbar)
with Gt the growth of each period t
r intrinsec growth of the stock
sbar carriyng capacity of the
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has
gone out on linux-security..... -- REW]
-----BEGIN PGP SIGNED MESSAGE-----
Content-Type: text/plain; charset=us-ascii
Has anyone been hit with the Bind Inverse Query Buffer Overrun on
their Linux servers? We have had 3 servers attacked using this
expoit and all of the machines had several binaries replaced with
trojan
1997 Jan 29
5
evidence/timelines that show linux is "more secure"
I''m looking for some evidence, backup up with dates and references,
that shows that the Linux community responds to security problems
more quickly than other OS vendors, and thus might be considered
"more secure". A number of fairly high profile corporations are
starting to look for such information as they consider Linux as an
alternative solution to other UNIXes.
Something