search for: expoitable

Displaying 7 results from an estimated 7 matches for "expoitable".

Did you mean: exploitable
2017 Feb 02
0
Serious attack vector on pkcheck ignored by Red Hat
...your existing bug reports is spent discussing a non-issue. If you want this issue to be taken seriously, I have a couple of pointers: First, drop the bug reports that have been closed. Those tickets are now convoluted and clouded by misguided discussion of a bug in pkcheck.c, which isn't expoitable. Continued arguing in those bug reports will be counter-productive. Open a new bug report and focus on this patch, exclusively: https://cgit.freedesktop.org/polkit/commit/src/programs/pkexec.c?id=6c992bc8aefa195a41eaa41c07f46f17de18e25c The upstream developer has disallowed multiple --user speci...
2002 Jul 30
1
OpenSSL Security Advisory [30 July 2002]
Hi, FYI - don't sue me for posting this here - I know, everyone who needs this info *should* have it already, but maybe not ;-) Kind regards, B. Courtin -- OpenSSL Security Advisory [30 July 2002] This advisory consists of two independent advisories, merged, and is an official OpenSSL advisory. Advisory 1 ========== A.L. Digital Ltd and The Bunker (http://www.thebunker.net/) are
2019 Mar 09
2
[Bug 13827] New: despite --copy-unsafe-links, rsync does not copy the referent of symlinks that point one level outside the copied tree
https://bugzilla.samba.org/show_bug.cgi?id=13827 Bug ID: 13827 Summary: despite --copy-unsafe-links, rsync does not copy the referent of symlinks that point one level outside the copied tree Product: rsync Version: 3.1.3 Hardware: All OS: All Status: NEW Severity:
2017 Feb 02
3
Serious attack vector on pkcheck ignored by Red Hat
On Thu, 2017-02-02 at 07:16 -0800, Gordon Messmer wrote: > On 02/02/2017 06:51 AM, Leonard den Ottolander wrote: > > pkcheck might not be directly vulnerable. However, pkexec is. > > > If that's so, why are you supplying patches to pkcheck rather than > fixing pkexec? The patch has a fix for three memory leaks. One memory leak that allows heap spraying in pkexec.c that
2003 Dec 02
2
model of fish over exploitation
Dear all, I have a serious problem to solve my model. I study over exploitation of fish in the bay of biscay (france). I know only the level of catch and the fishing effort (see data below) by year. My model is composed by the following equations: * the growth function Gt(St) = r*St*(1-St/sbar) with Gt the growth of each period t r intrinsec growth of the stock sbar carriyng capacity of the
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has gone out on linux-security..... -- REW] -----BEGIN PGP SIGNED MESSAGE----- Content-Type: text/plain; charset=us-ascii Has anyone been hit with the Bind Inverse Query Buffer Overrun on their Linux servers? We have had 3 servers attacked using this expoit and all of the machines had several binaries replaced with trojan
1997 Jan 29
5
evidence/timelines that show linux is "more secure"
I''m looking for some evidence, backup up with dates and references, that shows that the Linux community responds to security problems more quickly than other OS vendors, and thus might be considered "more secure". A number of fairly high profile corporations are starting to look for such information as they consider Linux as an alternative solution to other UNIXes. Something