Displaying 20 results from an estimated 400 matches similar to: "Fwd: FreeBSD kernel buffer overflow"
2003 Sep 17
0
Fwd: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]
More patch-o-rama :-(
---Mike
>From: Michal Zalewski <lcamtuf@dione.ids.pl>
>To: bugtraq@securityfocus.com, <vulnwatch@securityfocus.com>,
> <full-disclosure@netsys.com>
>X-Nmymbofr: Nir Orb Buk
>Subject: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one)
>[CAN-2003-0694]
>Sender: full-disclosure-admin@lists.netsys.com
>X-BeenThere:
2013 Jun 06
1
Reproducable Infiniband panic
Hello,
I see a reproducable panic when doing ibping and aborting it with ^C. My
setup is two machines with Mellanox Infinihost III HCAs (one Linux one
FreeBSD) connected back-to-back.
Details below. I can upload 2 crash dumps, if this is useful. For some
reason the port doesn't become ACTIVE, so no packets arrive, but that is
probably unrelated.
% uname -a
FreeBSD cosel.inf.tu-dresden.de
2019 Jan 25
0
[klibc:update-dash] parser: use pgetc_eatbnl() in more places
Commit-ID: acd0936c5f8b4f5d94065ca46714d17e6a882cf2
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=acd0936c5f8b4f5d94065ca46714d17e6a882cf2
Author: Harald van Dijk <harald at gigawatt.nl>
AuthorDate: Thu, 8 Mar 2018 08:37:11 +0100
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Fri, 25 Jan 2019 02:57:21 +0000
[klibc] parser: use pgetc_eatbnl()
2020 Mar 28
0
[klibc:update-dash] dash: parser: use pgetc_eatbnl() in more places
Commit-ID: a4659bfa776f24f790c3ec071c5c9ef9459cdb70
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=a4659bfa776f24f790c3ec071c5c9ef9459cdb70
Author: Harald van Dijk <harald at gigawatt.nl>
AuthorDate: Thu, 8 Mar 2018 08:37:11 +0100
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Sat, 28 Mar 2020 21:42:54 +0000
[klibc] dash: parser: use
2020 Mar 28
0
[klibc:update-dash] dash: eval: Add assignment built-in support again
Commit-ID: 166a88f4568067378ddce23b91be7b4ec9a9dfb4
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=166a88f4568067378ddce23b91be7b4ec9a9dfb4
Author: Herbert Xu <herbert at gondor.apana.org.au>
AuthorDate: Sat, 19 May 2018 02:39:52 +0800
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Sat, 28 Mar 2020 21:42:55 +0000
[klibc] dash: eval: Add
2004 Feb 17
0
OpenSSH 3.7 released (fwd)
Since there never was an answer on the secureshell at securityfocus.com list
to this question, I thought I'd ask you guys on your own list and maybe
I'll even get an answer.
If the answer involves PAM in any way, then the most obvious question
becomes "what about IRIX, Tru64, or any other platforms whose login
procedure does not have PAM?".
----- Forwarded message from Atro
2003 Sep 15
1
Fwd: Re: [Full-Disclosure] new ssh exploit?
Has anyone around here heard of this ?
---Mike
>Subject: Re: [Full-Disclosure] new ssh exploit?
>From: christopher neitzert <chris@neitzert.com>
>Reply-To: chris@neitzert.com
>To: full-disclosure@lists.netsys.com
>X-Mailer: Ximian Evolution 1.4.3.99
>Sender: full-disclosure-admin@lists.netsys.com
>X-BeenThere: full-disclosure@lists.netsys.com
1999 Jul 30
0
Linux 2.2.10 ipchains Advisory (fwd)
---------- Forwarded message ----------
Received: from lists.securityfocus.com (lists.securityfocus.com [216.102.46.4])
by blues.jpj.net (right/backatcha) with SMTP id VAA15167
for <trevor@JPJ.NET>; Tue, 27 Jul 1999 21:17:48 -0400 (EDT)
Received: (qmail 28179 invoked from network); 27 Jul 1999 19:14:06 -0000
Received: from lists.securityfocus.com (216.102.46.4)
by lists.securityfocus.com
2004 Aug 06
0
Fwd: Icecast temp patch (OR: Patches? We DO need stinkin' patches!!@$!)
Hi There,
re. the recently reported buffer overflow in icecast, is there any
"official" security patch against 1.3.11 ? I am reluctant to take any
un-official patch like this one ;-)
There is nothing on www.icecast.org/releases, maybe it's somewhere else ?
Thanks.
Alfredo
<p><p>>Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
>List-Id:
2006 Sep 05
2
http://www.openssl.org/news/secadv_20060905.txt
Does anyone know the practicality of this attack ? i.e. is this trivial to do ?
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada
2006 Sep 28
1
OpenSSH DoS issue ?
Is the version in FreeBSD vulnerable ?
http://www.openssh.com/txt/release-4.4
I know version 1 is disabled by default, but if its not, does it
impact the daemon ?
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing
2003 Sep 23
1
NTP common code base ?
Cisco released an advisory about their ntp client and server having a bug
http://www.cisco.com/warp/public/707/NTP-pub.shtml
Is there a common code base at all that would have relevance to the code in
FreeBSD ? I noticed in the COPYRIGHT file cisco has made some contributions.
---Mike
--------------------------------------------------------------------
Mike Tancsa,
2003 Aug 28
1
new DoS technique (exploiting TCP retransmission timeouts)
An interesting paper
http://www.acm.org/sigcomm/sigcomm2003/papers/p75-kuzmanovic.pdf
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
2003 Jun 02
0
sbsize and local DoS issue via kernel panic
I noticed with active ftp clients (specifically IMP's .forward modification
plugin), an sbsize of something under 32M in /etc/login.conf on the target
server now gives
Can't create data socket (M-^A> (^A,_<F5>^R(^C): No buffer space available.
in the ftp logs. What is a safe value to prevent users from abusing the
system by eating up all mbufs ? There is a local DoS if
2008 Aug 21
0
working around TOE bug
I dont have too many production RELENG_7 boxes post TOE MFC, but on
the ones I do, apart from applying
# diff -u src/sys/netinet/tcp_offload.c src/sys/netinet/tcp_offload.c.disable
--- src/sys/netinet/tcp_offload.c 2008-07-31 18:25:51.000000000 -0400
+++ src/sys/netinet/tcp_offload.c.disable 2008-08-21
09:39:07.000000000 -0400
@@ -58,6 +58,8 @@
struct rtentry *rt;
2003 Jul 01
2
4.9R bug fix ?
Any chance someone can look at / commit the fix in PR 52349 before 4.9R ?
Its a simple fix. As it is to netstat, I dont know of anyone who 'owns'
that program to bug other than to make a general plea :-)
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications,
2003 Apr 09
0
Fwd: Re: 3ware 3dmd broken in STABLE ( due to cvs commit: src/sys/kern kern_descrip.c kern_fork.c )
Thanks to Tor Egge for providing the binary patch and procedure below!
-------
begin 644 3dmd.bpatch.144284
6#[IL)`0-N/L```#-@'+KA=)T`C'`PP``
`
end
-------
The resulting 3dmd works with a STABLE as of today. Perhaps there should
be a note in the port ?
---Mike
>If you unpack the following snippet
>
>using uudecode, you should the following checksum:
>
>MD5
2003 May 29
0
sbsize and active ftp sessions (login.conf)
I noticed with active ftp clients (specifically IMP's .forward modification
plugin), an sbsize of something under 32M in /etc/login.conf on the target
server now gives
Can't create data socket (M-^A> (^A,_<F5>^R(^C): No buffer space available.
in the ftp logs. What is a safe value to prevent users from abusing the
system by eating up all mbufs ? There is a local DoS if
2003 Sep 04
0
crash dumps to ar not supported ?
I was suggesting to someone that they enable crash dumps on their server
but they have everything on an IDE raid partition.
--------------------
Fatal trap 12: page fault while in kernel mode
fault virtual address = 0xbed557c5
fault code = supervisor read, page not present
instruction pointer = 0x8:0xc027c38d
stack pointer = 0x10:0xdea01ecc
frame pointer =
2004 Jan 16
1
HiFn / FAST_IPSEC question
Hi,
Just got some of the new Soekris 1401 VPN cards based on the hifn 7955 chip.
hifn0 mem 0xe8510000-0xe8517fff,0xe8518000-0xe8519fff,0xe851a000-0xe851afff
irq 5 at device 0.0 on pci1
hifn0: Hifn 7955, rev 0, 32KB dram, 64 sessions
vs
hifn0 mem 0xeb902000-0xeb902fff,0xeb901000-0xeb901fff irq 10 at device 8.0
on pci0
hifn0: Hifn 7951, rev 0, 128KB sram, 193 sessions
When it says "n