search for: kernelconfig

Displaying 20 results from an estimated 127 matches for "kernelconfig".

2006 Oct 07
1
problems with LVM and upgrade new kernel 2.6.18
...me story and a solution but the solution does not work for me and I see the same situation at http://www.centos.org/modules/newbb/viewtopic.php?topic_id=5087 I do not know what do to any more, hopefully you can help me with getting kernel 2.6.18 working. CentOS systems: 4.3 en 4.4 Kernel: 2.6.18 Kernelconfig: http://www.netfeed.nl/software/kernels/2.6.18/kernelconfig Many thanks in advance! -- Met vriendelijke groeten / Kind regards, ? Thijs Joosten
2004 Mar 29
0
FreeBSD Security Advisory FreeBSD-SA-04:06.ipv6
...system panic. IV. Workaround Do one of the following: 1) Disable IPv6 entirely by following these steps: - Remove or comment out any lines mentioning `INET6' from your kernel configuration file, and recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html>. - Reboot your system. 2) If all untrusted users are confined within a jail(8), ensure that the security.jail.socket_unixiproute_only sysctl is set to 1 and verify that no IPv6 sockets are currently open: # sysctl security.jail.socket_unixiproute_only=1 # sockstat -6 This will restr...
2004 Mar 29
0
FreeBSD Security Advisory FreeBSD-SA-04:06.ipv6
...system panic. IV. Workaround Do one of the following: 1) Disable IPv6 entirely by following these steps: - Remove or comment out any lines mentioning `INET6' from your kernel configuration file, and recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html>. - Reboot your system. 2) If all untrusted users are confined within a jail(8), ensure that the security.jail.socket_unixiproute_only sysctl is set to 1 and verify that no IPv6 sockets are currently open: # sysctl security.jail.socket_unixiproute_only=1 # sockstat -6 This will restr...
2008 Jul 03
4
NUT with PowerWalker vi 400 se (usb).
Hi. I'm from Russia. I try to use NUT with PowerWalker vi 400 se (usb). I use FreeBSD 7.0 (amd64) and megatec_usb driver. Settingup the NUT with FreeBSD installation procedure (Thierry Thomas, from FreeBSD). PowerWalker connect to the computer by usb cable on port usb0 (uhib0). NUT don't starting, and talk to me that supporting device not found. Please, help me. Thank's! With best
2002 May 29
0
FreeBSD Security Advisory FreeBSD-SA-02:26.accept
...only application known to utilize accept filters by default. IV. Workaround Do not use accept filters. If you have enabled the ACCEPT_FILTER_DATA or ACCEPT_FILTER_HTTP options in your kernel, remove these options and recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. If you have loaded one of the kernel accept filters by using kldload(8), then you must modify your startup scripts not to load these modules and reboot your system. You may list loaded kernel modules by using kldstat(8). If loaded, the HTTP accept filter will be l...
2004 Jul 01
0
FreeBSD Security Advisory FreeBSD-SA-04:13.linux
...loaded as a module: # kldstat | grep linux.ko If no output is produced, the linux compatibility layer is compiled into the kernel. Remove the line options COMPAT_LINUX from your kernel configuration file and recompile the kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. If output is produced, then the linux compatibility layer is loaded as a kernel module. If the module is not currently being used (by a process running under linux emulation, for example) then it may be possible to unload it: # kldunload linux # kldstat | grep lin...
2004 Jul 01
0
FreeBSD Security Advisory FreeBSD-SA-04:13.linux
...loaded as a module: # kldstat | grep linux.ko If no output is produced, the linux compatibility layer is compiled into the kernel. Remove the line options COMPAT_LINUX from your kernel configuration file and recompile the kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. If output is produced, then the linux compatibility layer is loaded as a kernel module. If the module is not currently being used (by a process running under linux emulation, for example) then it may be possible to unload it: # kldunload linux # kldstat | grep lin...
2004 Feb 05
0
FreeBSD Security Advisory FreeBSD-SA-04:02.shmat
...o one of the following: 1) Disable the System V Shared Memory interface entirely by following these steps: - Remove or comment out any lines mentioning `SYSVSHM' from your kernel configuration file, and recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html>. - Remove or comment out any lines mentioning `sysvshm' from /boot/loader.conf and /etc/rc.conf. - On FreeBSD 5.x systems only , System V Shared Memory support may be provided as a kld(4). To be absolutely safe, remove any files named `sysvshm.ko' in /module...
2003 Aug 11
0
FreeBSD Security Advisory FreeBSD-SA-03:09.signal
...mpact, present only in FreeBSD 5.x systems, can be avoided by uncommenting or adding the `INVARIANTS' line to your kernel configuration: options INVARIANTS #Enable calls of extra sanity checking Recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. NOTE WELL: This workaround is only for FreeBSD 5.x systems. This workaround does not eliminate the possibility of a local denial-of-service attack. V. Solution 1) Upgrade your vulnerable system to 4.8-STABLE, or to any of the RELENG_4_8 (4.8-RELEASE-p2), RELEN...
2003 Aug 12
0
FreeBSD Security Advisory FreeBSD-SA-03:09.signal [REVISED]
...mpact, present only in FreeBSD 5.x systems, can be avoided by uncommenting or adding the `INVARIANTS' line to your kernel configuration: options INVARIANTS #Enable calls of extra sanity checking Recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. NOTE WELL: This workaround is only for FreeBSD 5.x systems. This workaround does not eliminate the possibility of a local denial-of-service attack. V. Solution 1) Upgrade your vulnerable system to 4.8-STABLE, or to any of the RELENG_4_8 (4.8-RELEASE-p2), RELEN...
2003 Aug 12
0
FreeBSD Security Advisory FreeBSD-SA-03:09.signal [REVISED]
...mpact, present only in FreeBSD 5.x systems, can be avoided by uncommenting or adding the `INVARIANTS' line to your kernel configuration: options INVARIANTS #Enable calls of extra sanity checking Recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. NOTE WELL: This workaround is only for FreeBSD 5.x systems. This workaround does not eliminate the possibility of a local denial-of-service attack. V. Solution 1) Upgrade your vulnerable system to 4.8-STABLE, or to any of the RELENG_4_8 (4.8-RELEASE-p2), RELEN...
2004 Feb 05
1
FreeBSD Security Advisory FreeBSD-SA-04:02.shmat
...o one of the following: 1) Disable the System V Shared Memory interface entirely by following these steps: - Remove or comment out any lines mentioning `SYSVSHM' from your kernel configuration file, and recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html>. - Remove or comment out any lines mentioning `sysvshm' from /boot/loader.conf and /etc/rc.conf. - On FreeBSD 5.x systems only , System V Shared Memory support may be provided as a kld(4). To be absolutely safe, remove any files named `sysvshm.ko' in /module...
2000 Dec 18
0
FreeBSD Security Advisory: FreeBSD-SA-00:77.procfs
...to mount filesystems, a successful jail root compromise in a jail without procfs visible cannot exploit this vulnerability. * Remove the "options PROCFS" line from your kernel configuration file, if present, and compile a new kernel as described in http://www.freebsd.org/handbook/kernelconfig.html If the running kernel was compiled with "options PROCFS", then any user who has root privileges can mount procfs and exploit vulnerability 3, regardless of system securelevel. If the kernel does not include this option, then an attempt to mount procfs will trigger a load...
2004 Mar 02
7
FreeBSD Security Advisory FreeBSD-SA-04:04.tcp
...fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-04:04/tcp47.patch # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-04:04/tcp47.patch.asc b) Apply the patch. # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. Branch Revision Path - ----------------------------------------------------------------...
2003 Aug 11
1
FreeBSD Security Advisory FreeBSD-SA-03:09.signal
...mpact, present only in FreeBSD 5.x systems, can be avoided by uncommenting or adding the `INVARIANTS' line to your kernel configuration: options INVARIANTS #Enable calls of extra sanity checking Recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. NOTE WELL: This workaround is only for FreeBSD 5.x systems. This workaround does not eliminate the possibility of a local denial-of-service attack. V. Solution 1) Upgrade your vulnerable system to 4.8-STABLE, or to any of the RELENG_4_8 (4.8-RELEASE-p2), RELEN...
2000 Oct 06
0
FreeBSD Security Advisory: FreeBSD-SA-00:52.tcp-iss
...sing your PGP utility. ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:52/tcp-iss-3.x.patch ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:52/tcp-iss-3.x.patch.asc # cd /usr/src/sys/ # patch -p < /path/to/patch [ Recompile your kernel as described in http://www.freebsd.org/handbook/kernelconfig.html and reboot the system ] 2b) FreeBSD 4.x systems Apply the patch below and recompile your kernel. Either save this advisory to a file, or download the patch and detached PGP signature from the following locations, and verify the signature using your PGP utility. ftp://ftp.freebsd.org/pub/Fr...
2003 Aug 02
1
Security
I have heard that somebody has compile a new kernel and he made Virtual User ....and if somebody want to use exploit he will connect to the virtual! can you tell me how to compile a kernel ??? I just have one but I want one more kernel to create that virtual user ! -- ______________________________________________ http://www.linuxmail.org/ Now with e-mail forwarding for only US$5.95/yr Powered
2012 Dec 09
1
PCENGINE, Alix2D3, Release 5.2
...${CWD}/build-kernel-injail.sh ${CWD}/${WORKDIR}/ cp -p ${CWD}/list ${CWD}/${WORKDIR}/ you were overwriting the kernel config you adjusted the MINIROOTSIZE before?! i was able to get up to a 58mb ramdisks on that board without failure at startup. please tell me if you are interested in any dmesg/kernelconfig/whatever listings for your configs. greets adrian
2006 Mar 22
1
FreeBSD Security Advisory FreeBSD-SA-06:11.ipsec
...fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:11/ipsec.patch # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:11/ipsec.patch.asc b) Apply the patch. # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. Branch Revision Path - ----------------------------------------------------------------...
2006 Mar 22
1
FreeBSD Security Advisory FreeBSD-SA-06:11.ipsec
...fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:11/ipsec.patch # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:11/ipsec.patch.asc b) Apply the patch. # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in <URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the system. VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. Branch Revision Path - ----------------------------------------------------------------...