Displaying 20 results from an estimated 10000 matches similar to: "Authentication By-Pass Vulnerability in OpenSSH-2.3.1 (devel snapshot)"
2001 Feb 08
2
Authentication By-Pass Vulnerability in OpenSSH 2.3.1 (devel snapshot) (fwd)
fyi for those running snapshots. the latest portable cvs has the fix
and the version is 2.3.2p1.
Kevin
---------- Forwarded message ----------
Date: Thu, 08 Feb 2001 18:15:00 -0500
From: Niels Provos <provos at citi.umich.edu>
To: security-announce at openbsd.org
Subject: Authentication By-Pass Vulnerability in OpenSSH 2.3.1 (devel
snapshot)
2010 Mar 02
2
Strange behavior with poisosn and glm
Hi,
I'm just learning about poison links for the glm function.
One of the data sets I'm playing with has several of the variables as
factors (i.e. month, group, etc.)
When I call the glm function with a formula that has a factor variable,
R automatically converts the variable to a series of variables with
unique names and binary values.
For example, with this pseudo data:
y
2007 Dec 16
0
Trixbox Arbitrary Command Execution Vulnerability
A
set of scripts were recently discovered in the trixbox line of PBX
products, which connect to a remote host every 24 hours, to retrieve an arbitrary
list of commands to be executed locally. These scripts were added
under the guise of submitting 'anonymous usage statistics', however,
with the help of DNS pollution, or malice on the part of the sponsoring
company (Fonality), all
2000 Jul 06
0
[RHSA-2000:042-01] BitchX denial of service vulnerability
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: BitchX denial of service vulnerability
Advisory ID: RHSA-2000:042-01
Issue date: 2000-07-06
Updated on: 2000-07-06
Product: Red Hat Powertools
Keywords: DoS
Cross references: N/A
1999 Jun 09
0
Fwd: ISSalert: ISS Security Advisory: KDE K-Mail File Creation Vulnerability
FYI, for those who may not have heard about this one. I got this from
another mailing list as is evident by the headers.
>Delivered-To: alert-out-link@iss.net
>Delivered-To: alert-out@iss.net
>Date: Wed, 9 Jun 1999 16:16:41 -0400 (EDT)
>From: X-Force <xforce@iss.net>
>To: alert@iss.net
>cc: X-Force <xforce@iss.net>
>Subject: ISSalert: ISS Security Advisory: KDE
2004 Apr 08
2
[librsync-devel] librsync and rsync vulnerability to maliciously crafted data. was Re: MD4 checksum_seed
On Thu, 2004-04-08 at 12:36, Martin Pool wrote:
> On 5 Apr 2004, Donovan Baarda <abo@minkirri.apana.org.au> wrote:
>
> > librsync needs a whole file checksum. Without it, it silently fails for
> > case 1), 3), and 4).
>
> Yes, a whole-file checksum should be used with it. Presumably
> something stronger than md4 like SHA-1.
md4 is probably good enough for most
2001 Mar 14
0
[RHSA-2001:029-02] New mutt packages fix IMAP vulnerability/incompatibility
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory
Synopsis: New mutt packages fix IMAP vulnerability/incompatibility
Advisory ID: RHSA-2001:029-02
Issue date: 2001-03-09
Updated on: 2001-03-13
Product: Red Hat Linux
Keywords: mutt IMAP format string GSSAPI
Cross
2010 Feb 02
0
[Security] Loofah has an HTML injection / XSS vulnerability, please upgrade to 0.4.6
Synopsis
----------
Loofah::HTML::Document#text emits unencoded HTML entities prior to
0.4.6. This was originally by design, since the output of #text is
intended to be used in a non-HTML context (such as generation of
human-readable text documents).
However, Loofah::XssFoliate''s default behavior and
Loofah::Helpers#strip_tags
both use #text to strip tags out of the output, meaning that
2006 Sep 22
1
How to retrieve results of most recent command?
In R, is there an automatic variable that stores the results of the most
recent command or commands? (I am thinking of a behavior like
Mathematica's % result-history substitution syntax.)
(I am using R 2.3.1 on Linux and R 2.3.1 on Windows XP.)
This is a pretty basic question, so I tried to do an extensive version
of the recommended pre-posting homework.
>
2018 Mar 28
0
Release 2.3.1
On 27 March 2018 at 20:06, <aki.tuomi at dovecot.fi> wrote:
> Hi!
>
> We are releasing v2.3.1, which mostly consists of bug fixes for 2.3.0, and
> few improvements. This is also available via https://repo.dovecot.org if
> you want packages. libsodium support didn't get into this build, due to
> build environment issues, but 2.3.2 will contain it.
>
> * Submission
2018 Jun 13
1
2.3.1 Replication is throwing scary errors
Hey all,
almost 48h ago I upgraded both my instances to 2.3.1 again to see if
the new patches would fix the replication issues for me.
So far, the result is: great.
I haven't been able to provoke any kind of I/O stall or persisting
queued/failed resync requests in my replication setup.
Newly added users are replicated instantly upon the first received
mails and the home directory gets
2000 Aug 08
0
[RHSA-2000:049-02] Remote file access vulnerability in ntop
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Remote file access vulnerability in ntop
Advisory ID: RHSA-2000:049-02
Issue date: 2000-08-07
Updated on: 2000-08-08
Product: Red Hat Powertools
Keywords: N/A
Cross references: N/A
2000 Jun 07
0
[RHSA-2000:032-02] kdelibs vulnerability for suid-root KDE applications
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: kdelibs vulnerability for suid-root KDE applications
Advisory ID: RHSA-2000:032-02
Issue date: 2000-06-07
Updated on: 2000-06-07
Product: Red Hat Powertools
Keywords: N/A
Cross references: N/A
2018 Mar 29
0
Release 2.3.1
On 29 March 2018 at 09:43, Aki Tuomi <aki.tuomi at dovecot.fi> wrote:
>
>
> On 28.03.2018 22:14, Odhiambo Washington wrote:
>
>
>
> On 27 March 2018 at 20:06, <aki.tuomi at dovecot.fi> wrote:
>
>> Hi!
>>
>> We are releasing v2.3.1, which mostly consists of bug fixes for 2.3.0,
>> and few improvements. This is also available via
2018 Mar 29
0
Release 2.3.1
On 29 March 2018 at 13:04, Aki Tuomi <aki.tuomi at dovecot.fi> wrote:
>
>
> On 29.03.2018 10:36, Odhiambo Washington wrote:
>
>
>
> On 29 March 2018 at 09:43, Aki Tuomi <aki.tuomi at dovecot.fi> wrote:
>
>>
>>
>> On 28.03.2018 22:14, Odhiambo Washington wrote:
>>
>>
>>
>> On 27 March 2018 at 20:06, <aki.tuomi at
2018 May 15
0
2.3.1 with quota and lmtp; message may be sent more than once
Op 14-5-2018 om 23:43 schreef Stephan Bosch:
> Op 14/05/2018 om 23:17 schreef Stephan Bosch:
>>
>>
>> Op 01/05/2018 om 10:12 schreef Frank Ebert:
>>> Hi,
>>>
>>> I have another problem with dovecot 2.3.1 on FreeBSD (smtpd is postfix
>>> 3.3.0). When one mail is sent with different recipients and the quota
>>> limit of one user is
2007 Oct 16
0
Icecast 2.3.1 crash
Geoff Shang wrote:
> Hi,
>
> I woke up this morning to find out that Icecast 2.3.1 running under
> Ubuntu Feisty had crashed or otherwise terminated. I don't know why,
> but I've got a theory.
>
> I'm currently trying to get a streamer working properly. At times it
> goes into a state when it connects very briefly then disconnects again.
> This of
2018 Mar 29
0
Release 2.3.1
On 29 March 2018 at 13:26, Aki Tuomi <aki.tuomi at dovecot.fi> wrote:
>
>
> On 29.03.2018 13:14, Odhiambo Washington wrote:
>
>
>
> On 29 March 2018 at 13:04, Aki Tuomi <aki.tuomi at dovecot.fi> wrote:
>
>>
>>
>> On 29.03.2018 10:36, Odhiambo Washington wrote:
>>
>>
>>
>> On 29 March 2018 at 09:43, Aki Tuomi
2008 May 18
2
Vulnerability with compromised geli credentials?
I'm not really a developer, but was considering if there is a key
vulnerability in geli given that when you change a key there isn't a disk
update.
Consider the scenario where a new file system is created and populated
with some files. At a later time the original key is changed because
someone has gained access to the key and passphrase. A new key is
generated and attached, but none of
2008 Nov 18
0
Alleged OpenSSH vulnerability
Hi,There is an alleged OpenSSH vulnerability, see http://www.cpni.gov.uk/Products/alerts/3718.aspx.According to this vulnerability an attacker can potentially recover 32 bits of plaintext from an arbitrary block of ciphertext.
After having read the vulnerability note in more detail, my understanding is that the 32 bits of plaintext do not come from the exchange between the client and server of the