Displaying 20 results from an estimated 462 matches for "unpatched".
2017 Feb 18
2
[RFC] Using Intel MPX to harden SafeStack
...d such overhead will be on top of whatever overhead SafeStack has.
> Do you have any measurements to share?
>
Here are estimated SPECint_base2006 component runtimes for some relevant
test configurations:
Runtime in seconds:
+--------------+---------+---------+---------+-------+
|Benchmark|Unpatched|Unpatched|Patched|MPX|
||Base|SafeStack|SafeStack||
+--------------+---------+---------+---------+-------+
|400.perlbench |430.82|443.07|442.42|456.34 |
+--------------+---------+---------+---------+-------+
|401.bzip2|711.43|716.59|717.35|750.06 |
+--------------+---------+---------+--------...
2012 Jun 27
2
[LLVMdev] Compiler warnings with gcc-4.7.1
I just switched gcc from 4.6.2 to 4.7.1 and see the massive amount of
warnings, see few examples below.
They mostly didn't exist with gcc-4.6.2.
rev.159224
Yuri
/usr/home/yuri/llvm-2012-06/latest-unpatched/llvm-fix/include/llvm/ADT/PointerUnion.h:56:10:
warning: enumeral mismatch in conditional expression:
‘llvm::PointerLikeTypeTraits<llvm::PointerUnion<clang::FunctionTemplateDecl*,
clang::MemberSpecializationInfo*> >::<anonymous enum>’ vs
‘llvm::PointerLikeTypeTraits<llvm::P...
2012 Jun 27
0
[LLVMdev] Compiler warnings with gcc-4.7.1
...t 5:15 PM, Yuri <yuri at rawbw.com> wrote:
> I just switched gcc from 4.6.2 to 4.7.1 and see the massive amount of
> warnings, see few examples below.
> They mostly didn't exist with gcc-4.6.2.
>
> rev.159224
>
> Yuri
>
>
> /usr/home/yuri/llvm-2012-06/latest-unpatched/llvm-fix/include/llvm/ADT/PointerUnion.h:56:10:
> warning: enumeral mismatch in conditional expression:
>
> ‘llvm::PointerLikeTypeTraits<llvm::PointerUnion<clang::FunctionTemplateDecl*,
> clang::MemberSpecializationInfo*> >::<anonymous enum>’ vs
>
> ‘llvm::Pointe...
2015 Aug 13
2
unpatched local root on centos 5?
Hi List,
Looks like this affects on centos 5 and is unpatched like on rhel 5?
https://access.redhat.com/articles/1537873
Trying to test if this affects on centos 5. can someone compile this
exploit on centos 5?
https://www.qualys.com/research/security-advisories/roothelper.c
any ideas how to compile it on centos 5?
--
Eero
2005 Aug 22
1
Howto unpatch the xen tree
Hi,
If i download the patches in my tree with
"hg pull -u" and i think a certain patch breaks
my setup, how can i unpatch the file.
i have the patch in .diff format...
kind regards,
Robin van Leeuwen
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2011 Dec 28
8
what percent of time are there unpatched exploits against default config?
...I'm not subscribed to any security alert
mailing lists which send out announcements like "Please disable this
feature as a workaround until this hole is plugged", so the machine just
hums along with all of its default settings.
So the machine can still be broken into, if there is an unpatched exploit
released in the wild, in the window of time before a patch is released for
that update. On the other hand, at any point in time where there are no
unpatched exploits in the wild, the machine should be much harder to break
into.
Roughly what percent of the time is there such an unpatched e...
2015 Aug 13
2
unpatched local root on centos 5?
well, very sad to hear as I use commercial rhel 5 and paying for it..
Eero
2015-08-13 19:57 GMT+03:00 Johnny Hughes <johnny at centos.org>:
> On 08/12/2015 10:43 PM, Eero Volotinen wrote:
> > Hi List,
> >
> > Looks like this affects on centos 5 and is unpatched like on rhel 5?
> >
> > https://access.redhat.com/articles/1537873
> >
> > Trying to test if this affects on centos 5. can someone compile this
> > exploit on centos 5?
> > https://www.qualys.com/research/security-advisories/roothelper.c
> >
> > any i...
2004 Feb 10
1
Longest known unpatched FreeBSD security issue ?
Does anyone know off hand what the longest known serious security issue
(i.e. remote compromise) has been with FreeBSD that went unpatched ? e.g.
security hole is reported to security-officer@FreeBSD.org. X days later,
fix and advisory committed. What has been the largest X ?
My jaw dropped when I saw
http://www.eeye.com/html/Research/Upcoming/index.html
---Mike
----------------------------------------------------------------...
2015 Aug 13
0
unpatched local root on centos 5?
On 08/12/2015 10:43 PM, Eero Volotinen wrote:
> Hi List,
>
> Looks like this affects on centos 5 and is unpatched like on rhel 5?
>
> https://access.redhat.com/articles/1537873
>
> Trying to test if this affects on centos 5. can someone compile this
> exploit on centos 5?
> https://www.qualys.com/research/security-advisories/roothelper.c
>
> any ideas how to compile it on centos 5?...
2015 Aug 13
0
unpatched local root on centos 5?
...I would recommend RHEL-6 or RHEL-7 for your RHEL-5
workloads :)
>
> 2015-08-13 19:57 GMT+03:00 Johnny Hughes <johnny at centos.org>:
>
>> On 08/12/2015 10:43 PM, Eero Volotinen wrote:
>>> Hi List,
>>>
>>> Looks like this affects on centos 5 and is unpatched like on rhel 5?
>>>
>>> https://access.redhat.com/articles/1537873
>>>
>>> Trying to test if this affects on centos 5. can someone compile this
>>> exploit on centos 5?
>>> https://www.qualys.com/research/security-advisories/roothelper.c
>>...
2015 Aug 14
1
unpatched local root on centos 5?
...nd very weird, that supported os is not patched. is the list of non
patched security issues in rhel 5 / centos 5
--
Eero
2015-08-14 7:59 GMT+03:00 Mark Milhollan <mlm at pixelgate.net>:
> On Thu, 13 Aug 2015, Eero Volotinen wrote:
>
> >Looks like this affects on centos 5 and is unpatched like on rhel 5?
>
> >Trying to test if this affects on centos 5.
>
> It does. Red Hat won't patch RHEL 5 so it is likely there will be no
> patch from CentOS for CentOS 5 either.
>
>
> /mark
>
2016 Nov 18
4
Good email client to use with Dovecot?
FWIW, I use claws, which is about the only one not mentioned.?
I don't like Thunderbird. For one thing, it is in caretaker status. Mozilla believes Web based mail is the "future." I rather not run roundcube, given I got hacked via an unpatched roundcube ?back when I was using a hosting company. ? Webmail just increases your attack surface.?
2010 Jul 30
2
lustre 1.8.3 upgrade observations
...nfigure --enable-server" should fail when it is not able to build the server modules, instead of printing the following message:
<snip>
checking if kernel defines unshare_fs_struct()... no
checking for /usr/src/linux-2.6.27.39-0.3/include/linux/lustre_version.h... no
configure: WARNING: Unpatched kernel detected.
configure: WARNING: Lustre servers cannot be built with an unpatched kernel;
configure: WARNING: disabling server build
checking whether to enable pinger support... yes
<snap>
Used SuSE-2.6-sles11 2.6.27.39-0.3 kernel source from the lustre site.
2) tunefs.lustre fails on M...
2008 Nov 28
3
[PATCH] multi-page blkfront/blkback patch
...6 11:13:49 2008 +0000
summary: Merge with ia64 tree.
The patch adds support for 1,2 and 4 pages ring for block devices. The
number of page is configured when compiling blkfront. The xenstore
setup protocol is backward compatible in the sense that a patched
blkback will support both patched and unpatched blkfront, and a
patched blkfront will use the existing protocol when setting up a 1
page ring so that it works with existing dom0. A guest will fail at
boot time if it tries to setup a multi-page ring with an unpatched
dom0.
The ring setup protocol is a bit crude and it would be much nicer if
the...
2023 Jul 14
1
Test-ComputerSecureChannel -Verbose False since windows 10/11 update 07/2023
Hello all,
https://bugzilla.samba.org/show_bug.cgi?id=15418#c20 "This could be a shortterm fix in order to behave like an unpatched windows server"
What is the attack scenario of an unpatched windows server? After all Microsoft likely patched to fix an issue, the short term solution probably restores not only NLA but also the vulnerability..
I am not arguing against the fix, as the switch is obviously buggy, but I am hopin...
2004 May 19
1
R with shared library support: 'make check' fails with unresolved symbol (PR#6896)
...Version: 1.9.0
OS: OSF1 Alpha ev6
Submission from: (NULL) (128.42.129.78)
I configured R 1.9.0 with --enable-R-shlib on Alpha. 'make check' fails with an
unresolved symbol. Here's the relevant output:
running code in 'reg-tests-1.R'
...529442:/home/garvin/research/tel/R-alpha/unpatched/R-1.9.0/lib/R/bin/R.bin:
/sbin/loader: Fatal Error: call to unresolved symbol from
/home/garvin/research/tel/R-alpha/unpatched/R-1.9.0/lib/R/modules/lapack.so
(pc=0x3ffbfde345c)
I'm using Compaq cc version V6.4-009 and ld version 5.1.
2004 Feb 10
1
Samba / Networking trouble since latest windows update
This is not really a Samba problem, but it does relate to Samba, in a
fashion...
In regards to:
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulleti
n/MS04-004.asp
Since the latest security patch from Microsoft (last Thursday?) was
applied to common desktop machines within our school we have been
suffering from problems with network connections.
We run several Mac OS X
2006 Oct 10
1
failure to add a machine to domain
We put together a samba 3.0.x server to replace an nt domain
controller 3 weeks ago when our nt servers were being hit by and
unpatched/unpatchable vulnerability in nt. we went through numerous
howto's and other documents. The net rpc vampire seem to grab
everything fine. However, now when we attempt to add a machine to the
domain we get a failure.
looking through the log files we see
2006/10/09 17:29:21, 5] auth/auth_util.c...
2017 Feb 08
4
[RFC] Using Intel MPX to harden SafeStack
Hi,
I previously posted about using 32-bit X86 segmentation to harden SafeStack: http://lists.llvm.org/pipermail/llvm-dev/2016-May/100346.html That involves lowering the limits of the DS and ES segments that are used for ordinary data accesses while leaving the limit for SS, the stack segment, set to its maximum value. The safe stacks were clustered above the limits of DS and ES. Thus, by
2005 Apr 01
2
[ANNOUNCE] ESFQ for Linux 2.6.12-rc1
http://fatooh.org/esfq-2.6/
http://fatooh.org/esfq-2.6/esfq-2.6.12-rc1.tar.gz
This version no longer interferes with the original SFQ; unlike previous
versions, you can still use an unpatched tc with SFQ. Patching tc is
still needed for ESFQ, though. I''ve tested this patch with Linux 2.6.11
as well.
Please tell me if you have any problems. I''m subscribed to lartc again.
-Corey