similar to: Fwd: FreeBSD kernel buffer overflow

Displaying 20 results from an estimated 400 matches similar to: "Fwd: FreeBSD kernel buffer overflow"

2003 Sep 17
0
Fwd: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]
More patch-o-rama :-( ---Mike >From: Michal Zalewski <lcamtuf@dione.ids.pl> >To: bugtraq@securityfocus.com, <vulnwatch@securityfocus.com>, > <full-disclosure@netsys.com> >X-Nmymbofr: Nir Orb Buk >Subject: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one) >[CAN-2003-0694] >Sender: full-disclosure-admin@lists.netsys.com >X-BeenThere:
2013 Jun 06
1
Reproducable Infiniband panic
Hello, I see a reproducable panic when doing ibping and aborting it with ^C. My setup is two machines with Mellanox Infinihost III HCAs (one Linux one FreeBSD) connected back-to-back. Details below. I can upload 2 crash dumps, if this is useful. For some reason the port doesn't become ACTIVE, so no packets arrive, but that is probably unrelated. % uname -a FreeBSD cosel.inf.tu-dresden.de
2019 Jan 25
0
[klibc:update-dash] parser: use pgetc_eatbnl() in more places
Commit-ID: acd0936c5f8b4f5d94065ca46714d17e6a882cf2 Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=acd0936c5f8b4f5d94065ca46714d17e6a882cf2 Author: Harald van Dijk <harald at gigawatt.nl> AuthorDate: Thu, 8 Mar 2018 08:37:11 +0100 Committer: Ben Hutchings <ben at decadent.org.uk> CommitDate: Fri, 25 Jan 2019 02:57:21 +0000 [klibc] parser: use pgetc_eatbnl()
2020 Mar 28
0
[klibc:update-dash] dash: parser: use pgetc_eatbnl() in more places
Commit-ID: a4659bfa776f24f790c3ec071c5c9ef9459cdb70 Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=a4659bfa776f24f790c3ec071c5c9ef9459cdb70 Author: Harald van Dijk <harald at gigawatt.nl> AuthorDate: Thu, 8 Mar 2018 08:37:11 +0100 Committer: Ben Hutchings <ben at decadent.org.uk> CommitDate: Sat, 28 Mar 2020 21:42:54 +0000 [klibc] dash: parser: use
2020 Mar 28
0
[klibc:update-dash] dash: eval: Add assignment built-in support again
Commit-ID: 166a88f4568067378ddce23b91be7b4ec9a9dfb4 Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=166a88f4568067378ddce23b91be7b4ec9a9dfb4 Author: Herbert Xu <herbert at gondor.apana.org.au> AuthorDate: Sat, 19 May 2018 02:39:52 +0800 Committer: Ben Hutchings <ben at decadent.org.uk> CommitDate: Sat, 28 Mar 2020 21:42:55 +0000 [klibc] dash: eval: Add
2004 Feb 17
0
OpenSSH 3.7 released (fwd)
Since there never was an answer on the secureshell at securityfocus.com list to this question, I thought I'd ask you guys on your own list and maybe I'll even get an answer. If the answer involves PAM in any way, then the most obvious question becomes "what about IRIX, Tru64, or any other platforms whose login procedure does not have PAM?". ----- Forwarded message from Atro
2003 Sep 15
1
Fwd: Re: [Full-Disclosure] new ssh exploit?
Has anyone around here heard of this ? ---Mike >Subject: Re: [Full-Disclosure] new ssh exploit? >From: christopher neitzert <chris@neitzert.com> >Reply-To: chris@neitzert.com >To: full-disclosure@lists.netsys.com >X-Mailer: Ximian Evolution 1.4.3.99 >Sender: full-disclosure-admin@lists.netsys.com >X-BeenThere: full-disclosure@lists.netsys.com
1999 Jul 30
0
Linux 2.2.10 ipchains Advisory (fwd)
---------- Forwarded message ---------- Received: from lists.securityfocus.com (lists.securityfocus.com [216.102.46.4]) by blues.jpj.net (right/backatcha) with SMTP id VAA15167 for <trevor@JPJ.NET>; Tue, 27 Jul 1999 21:17:48 -0400 (EDT) Received: (qmail 28179 invoked from network); 27 Jul 1999 19:14:06 -0000 Received: from lists.securityfocus.com (216.102.46.4) by lists.securityfocus.com
2004 Aug 06
0
Fwd: Icecast temp patch (OR: Patches? We DO need stinkin' patches!!@$!)
Hi There, re. the recently reported buffer overflow in icecast, is there any "official" security patch against 1.3.11 ? I am reluctant to take any un-official patch like this one ;-) There is nothing on www.icecast.org/releases, maybe it's somewhere else ? Thanks. Alfredo <p><p>>Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm >List-Id:
2006 Sep 05
2
http://www.openssl.org/news/secadv_20060905.txt
Does anyone know the practicality of this attack ? i.e. is this trivial to do ? ---Mike -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet since 1994 www.sentex.net Cambridge, Ontario Canada
2006 Sep 28
1
OpenSSH DoS issue ?
Is the version in FreeBSD vulnerable ? http://www.openssh.com/txt/release-4.4 I know version 1 is disabled by default, but if its not, does it impact the daemon ? ---Mike -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing
2003 Sep 23
1
NTP common code base ?
Cisco released an advisory about their ntp client and server having a bug http://www.cisco.com/warp/public/707/NTP-pub.shtml Is there a common code base at all that would have relevance to the code in FreeBSD ? I noticed in the COPYRIGHT file cisco has made some contributions. ---Mike -------------------------------------------------------------------- Mike Tancsa,
2003 Aug 28
1
new DoS technique (exploiting TCP retransmission timeouts)
An interesting paper http://www.acm.org/sigcomm/sigcomm2003/papers/p75-kuzmanovic.pdf ---Mike -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet since 1994 www.sentex.net Cambridge, Ontario Canada www.sentex.net/mike
2003 Jun 02
0
sbsize and local DoS issue via kernel panic
I noticed with active ftp clients (specifically IMP's .forward modification plugin), an sbsize of something under 32M in /etc/login.conf on the target server now gives Can't create data socket (M-^A> (^A,_<F5>^R(^C): No buffer space available. in the ftp logs. What is a safe value to prevent users from abusing the system by eating up all mbufs ? There is a local DoS if
2008 Aug 21
0
working around TOE bug
I dont have too many production RELENG_7 boxes post TOE MFC, but on the ones I do, apart from applying # diff -u src/sys/netinet/tcp_offload.c src/sys/netinet/tcp_offload.c.disable --- src/sys/netinet/tcp_offload.c 2008-07-31 18:25:51.000000000 -0400 +++ src/sys/netinet/tcp_offload.c.disable 2008-08-21 09:39:07.000000000 -0400 @@ -58,6 +58,8 @@ struct rtentry *rt;
2003 Jul 01
2
4.9R bug fix ?
Any chance someone can look at / commit the fix in PR 52349 before 4.9R ? Its a simple fix. As it is to netstat, I dont know of anyone who 'owns' that program to bug other than to make a general plea :-) ---Mike -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications,
2003 Apr 09
0
Fwd: Re: 3ware 3dmd broken in STABLE ( due to cvs commit: src/sys/kern kern_descrip.c kern_fork.c )
Thanks to Tor Egge for providing the binary patch and procedure below! ------- begin 644 3dmd.bpatch.144284 6#[IL)`0-N/L```#-@'+KA=)T`C'`PP`` ` end ------- The resulting 3dmd works with a STABLE as of today. Perhaps there should be a note in the port ? ---Mike >If you unpack the following snippet > >using uudecode, you should the following checksum: > >MD5
2003 May 29
0
sbsize and active ftp sessions (login.conf)
I noticed with active ftp clients (specifically IMP's .forward modification plugin), an sbsize of something under 32M in /etc/login.conf on the target server now gives Can't create data socket (M-^A> (^A,_<F5>^R(^C): No buffer space available. in the ftp logs. What is a safe value to prevent users from abusing the system by eating up all mbufs ? There is a local DoS if
2003 Sep 04
0
crash dumps to ar not supported ?
I was suggesting to someone that they enable crash dumps on their server but they have everything on an IDE raid partition. -------------------- Fatal trap 12: page fault while in kernel mode fault virtual address = 0xbed557c5 fault code = supervisor read, page not present instruction pointer = 0x8:0xc027c38d stack pointer = 0x10:0xdea01ecc frame pointer =
2004 Jan 16
1
HiFn / FAST_IPSEC question
Hi, Just got some of the new Soekris 1401 VPN cards based on the hifn 7955 chip. hifn0 mem 0xe8510000-0xe8517fff,0xe8518000-0xe8519fff,0xe851a000-0xe851afff irq 5 at device 0.0 on pci1 hifn0: Hifn 7955, rev 0, 32KB dram, 64 sessions vs hifn0 mem 0xeb902000-0xeb902fff,0xeb901000-0xeb901fff irq 10 at device 8.0 on pci0 hifn0: Hifn 7951, rev 0, 128KB sram, 193 sessions When it says "n