search for: unpatching

Displaying 20 results from an estimated 462 matches for "unpatching".

Did you mean: unmatching
2017 Feb 18
2
[RFC] Using Intel MPX to harden SafeStack
On 2/7/2017 20:02, Kostya Serebryany wrote: > ... > > My understanding is that BNDCU is the cheapest possible instruction, > just like XOR or ADD, > so the overhead should be relatively small. > Still my guesstimate would be >= 5% since stores are very numerous. > And such overhead will be on top of whatever overhead SafeStack has. > Do you have any measurements to
2012 Jun 27
2
[LLVMdev] Compiler warnings with gcc-4.7.1
I just switched gcc from 4.6.2 to 4.7.1 and see the massive amount of warnings, see few examples below. They mostly didn't exist with gcc-4.6.2. rev.159224 Yuri /usr/home/yuri/llvm-2012-06/latest-unpatched/llvm-fix/include/llvm/ADT/PointerUnion.h:56:10: warning: enumeral mismatch in conditional expression:
2012 Jun 27
0
[LLVMdev] Compiler warnings with gcc-4.7.1
-Wenum-compare is buggy / bogus. We should turn this warning off in our build scripts if possible. On Tue, Jun 26, 2012 at 5:15 PM, Yuri <yuri at rawbw.com> wrote: > I just switched gcc from 4.6.2 to 4.7.1 and see the massive amount of > warnings, see few examples below. > They mostly didn't exist with gcc-4.6.2. > > rev.159224 > > Yuri > > >
2015 Aug 13
2
unpatched local root on centos 5?
Hi List, Looks like this affects on centos 5 and is unpatched like on rhel 5? https://access.redhat.com/articles/1537873 Trying to test if this affects on centos 5. can someone compile this exploit on centos 5? https://www.qualys.com/research/security-advisories/roothelper.c any ideas how to compile it on centos 5? -- Eero
2005 Aug 22
1
Howto unpatch the xen tree
Hi, If i download the patches in my tree with "hg pull -u" and i think a certain patch breaks my setup, how can i unpatch the file. i have the patch in .diff format... kind regards, Robin van Leeuwen _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2011 Dec 28
8
what percent of time are there unpatched exploits against default config?
Suppose I have a CentOS 5.7 machine running the default Apache with no extra modules enabled, and with the "yum-updatesd" service running to pull down and install updates as soon as they become available from the repository. (Assume further the password is strong, etc.) On the other hand, suppose that as the admin, I'm not subscribed to any security alert mailing lists which send
2015 Aug 13
2
unpatched local root on centos 5?
well, very sad to hear as I use commercial rhel 5 and paying for it.. Eero 2015-08-13 19:57 GMT+03:00 Johnny Hughes <johnny at centos.org>: > On 08/12/2015 10:43 PM, Eero Volotinen wrote: > > Hi List, > > > > Looks like this affects on centos 5 and is unpatched like on rhel 5? > > > > https://access.redhat.com/articles/1537873 > > > > Trying to
2004 Feb 10
1
Longest known unpatched FreeBSD security issue ?
Does anyone know off hand what the longest known serious security issue (i.e. remote compromise) has been with FreeBSD that went unpatched ? e.g. security hole is reported to security-officer@FreeBSD.org. X days later, fix and advisory committed. What has been the largest X ? My jaw dropped when I saw http://www.eeye.com/html/Research/Upcoming/index.html ---Mike
2015 Aug 13
0
unpatched local root on centos 5?
On 08/12/2015 10:43 PM, Eero Volotinen wrote: > Hi List, > > Looks like this affects on centos 5 and is unpatched like on rhel 5? > > https://access.redhat.com/articles/1537873 > > Trying to test if this affects on centos 5. can someone compile this > exploit on centos 5? > https://www.qualys.com/research/security-advisories/roothelper.c > > any ideas how to
2015 Aug 13
0
unpatched local root on centos 5?
On 08/13/2015 12:41 PM, Eero Volotinen wrote: > well, very sad to hear as I use commercial rhel 5 and paying for it.. > Well, in that case, I would recommend RHEL-6 or RHEL-7 for your RHEL-5 workloads :) > > 2015-08-13 19:57 GMT+03:00 Johnny Hughes <johnny at centos.org>: > >> On 08/12/2015 10:43 PM, Eero Volotinen wrote: >>> Hi List, >>>
2015 Aug 14
1
unpatched local root on centos 5?
Sound very weird, that supported os is not patched. is the list of non patched security issues in rhel 5 / centos 5 -- Eero 2015-08-14 7:59 GMT+03:00 Mark Milhollan <mlm at pixelgate.net>: > On Thu, 13 Aug 2015, Eero Volotinen wrote: > > >Looks like this affects on centos 5 and is unpatched like on rhel 5? > > >Trying to test if this affects on centos 5. > > It
2016 Nov 18
4
Good email client to use with Dovecot?
FWIW, I use claws, which is about the only one not mentioned.? I don't like Thunderbird. For one thing, it is in caretaker status. Mozilla believes Web based mail is the "future." I rather not run roundcube, given I got hacked via an unpatched roundcube ?back when I was using a hosting company. ? Webmail just increases your attack surface.?
2010 Jul 30
2
lustre 1.8.3 upgrade observations
Hello, 1) when compiling the lustre modules for the server the ./configure script behaves a bit odd. The --enable-server option is silently ignored when the kernel is not 100% patched. Unfortunatly the build works for the server, but during the mount the error message claims about a missing "lustre" module which is loaded and running. What is really missing are the ldiskfs et al
2008 Nov 28
3
[PATCH] multi-page blkfront/blkback patch
Hi, Here is the refreshed version of the multi-page ring patch for blkfront and blkback. I currently don''t have time to refresh the blktap part of the patch. The patch should apply cleanly to the following changeset in the linux 2.6.18 tree: changeset: 752:0b859c9516ba tag: qparent parent: 751:6591b4869889 parent: 748:5012c470f875 user: Keir Fraser
2023 Jul 14
1
Test-ComputerSecureChannel -Verbose False since windows 10/11 update 07/2023
Hello all, https://bugzilla.samba.org/show_bug.cgi?id=15418#c20 "This could be a shortterm fix in order to behave like an unpatched windows server" What is the attack scenario of an unpatched windows server? After all Microsoft likely patched to fix an issue, the short term solution probably restores not only NLA but also the vulnerability.. I am not arguing against the fix, as the
2004 May 19
1
R with shared library support: 'make check' fails with unresolved symbol (PR#6896)
Full_Name: John Garvin Version: 1.9.0 OS: OSF1 Alpha ev6 Submission from: (NULL) (128.42.129.78) I configured R 1.9.0 with --enable-R-shlib on Alpha. 'make check' fails with an unresolved symbol. Here's the relevant output: running code in 'reg-tests-1.R' ...529442:/home/garvin/research/tel/R-alpha/unpatched/R-1.9.0/lib/R/bin/R.bin: /sbin/loader: Fatal Error: call to
2004 Feb 10
1
Samba / Networking trouble since latest windows update
This is not really a Samba problem, but it does relate to Samba, in a fashion... In regards to: http://www.microsoft.com/technet/treeview/?url=/technet/security/bulleti n/MS04-004.asp Since the latest security patch from Microsoft (last Thursday?) was applied to common desktop machines within our school we have been suffering from problems with network connections. We run several Mac OS X
2006 Oct 10
1
failure to add a machine to domain
We put together a samba 3.0.x server to replace an nt domain controller 3 weeks ago when our nt servers were being hit by and unpatched/unpatchable vulnerability in nt. we went through numerous howto's and other documents. The net rpc vampire seem to grab everything fine. However, now when we attempt to add a machine to the domain we get a failure. looking through the log files we see
2017 Feb 08
4
[RFC] Using Intel MPX to harden SafeStack
Hi, I previously posted about using 32-bit X86 segmentation to harden SafeStack: http://lists.llvm.org/pipermail/llvm-dev/2016-May/100346.html That involves lowering the limits of the DS and ES segments that are used for ordinary data accesses while leaving the limit for SS, the stack segment, set to its maximum value. The safe stacks were clustered above the limits of DS and ES. Thus, by
2005 Apr 01
2
[ANNOUNCE] ESFQ for Linux 2.6.12-rc1
http://fatooh.org/esfq-2.6/ http://fatooh.org/esfq-2.6/esfq-2.6.12-rc1.tar.gz This version no longer interferes with the original SFQ; unlike previous versions, you can still use an unpatched tc with SFQ. Patching tc is still needed for ESFQ, though. I''ve tested this patch with Linux 2.6.11 as well. Please tell me if you have any problems. I''m subscribed to lartc again. -Corey