similar to: vixie cron issue.

Displaying 20 results from an estimated 600 matches similar to: "vixie cron issue."

2004 Jun 02
1
xdm security hole
Hi everyone, every comment about this: http://xforce.iss.net/xforce/xfdb/16264 Didn't find any hint or patch on http://www.xfree86.org/security/. Best regards Konrad Heuer (kheuer2@gwdg.de) ____ ___ _______ GWDG / __/______ ___ / _ )/ __/ _ \ Am Fassberg / _// __/ -_) -_) _ |\ \/ // / 37077 Goettingen /_/ /_/
2007 Mar 03
2
format of summary.lm for 2-way ANOVA
Hi, I am performing a two-way ANOVA (2 factors with 4 and 5 levels, respectively). If I'm interpreting the output of summary correctly, then the interaction between both factors is significant: ,---- | ## Two-way ANOVA with possible interaction: | > model1 <- aov(log(y) ~ xForce*xVel, data=mydataset) | | > summary(model1) | Df Sum Sq Mean Sq F value Pr(>F) |
2007 Feb 08
0
security issues of aio
Hallo, in /sys/conf/NOTES there is a comment | # Use real implementations of the aio_* system calls. There are numerous | # stability and security issues in the current aio code that make it | # unsuitable for inclusion on machines with untrusted local users. | options VFS_AIO Are there still problems with aio? I only found http://xforce.iss.net/xforce/xfdb/7693, but no advisory or
2004 Jul 09
1
NUL characters in POP3 conversation cause Outlook to hang
We're being bitten an Outlook bug [1,2] that is triggered by a NUL character in a message being sent through POP3. I see that dovecot's imap implementation converts 0x00 to 0x80, but this conversion is not done for POP3. Would it be possible to add an option to do this mapping for POP3 as well? Matt [1] http://xforce.iss.net/xforce/xfdb/15859 [2]
2005 Apr 22
0
FreeBSD Security Advisory FreeBSD-SA-05:05.cvs
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-05:05.cvs Security Advisory The FreeBSD Project Topic: Multiple vulnerabilities in CVS Category: contrib Module: cvs Announced:
2005 Apr 22
0
FreeBSD Security Advisory FreeBSD-SA-05:05.cvs
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-05:05.cvs Security Advisory The FreeBSD Project Topic: Multiple vulnerabilities in CVS Category: contrib Module: cvs Announced:
2004 Dec 07
3
Question about e1/digium
Hi all I am beginning in asterisk and am making tests with an ata-186. For the time being the tests are going well, however have a doubt. I am thinking about using a canal e1 with plate digium. Assuming that the company of telecommunications supplies e1 with 30 canals and numeration to me 4000-0001 4000-0029. she is possible to configure asterisk in way that somebody of is dials 4000-0025, to
1999 Jun 09
0
Fwd: ISSalert: ISS Security Advisory: KDE K-Mail File Creation Vulnerability
FYI, for those who may not have heard about this one. I got this from another mailing list as is evident by the headers. >Delivered-To: alert-out-link@iss.net >Delivered-To: alert-out@iss.net >Date: Wed, 9 Jun 1999 16:16:41 -0400 (EDT) >From: X-Force <xforce@iss.net> >To: alert@iss.net >cc: X-Force <xforce@iss.net> >Subject: ISSalert: ISS Security Advisory: KDE
2003 Dec 15
6
interface bonding
----- Forwarded message from John <strgout@mail.unixjunkie.com> ----- Date: Mon, 15 Dec 2003 17:58:15 -0600 From: John <strgout@mail.unixjunkie.com> To: freebsd-stable@freebsd.org Subject: interface bonding User-Agent: Mutt/1.4i Is there any way to bond sniffer interfaces? I've read a little on netgraph and it seems like i maybe able to use that but i'm not sure how to go
2001 Dec 13
3
Access denial
Hi, My name is Tom Faulhaber. I am the network administrator at a small company in Providence,RI. I am running Samba 2.2.2 on a Redhat 6.1 machine on a Novell 4.21 network. The workstations are Win98SE. The Linux box is being used for the company intranet (Apache 1.3.22). Everything runs fine, however I am completely stumped on one issue (so far). That issue is: network connectivity. If I
2007 Apr 22
1
How to add e.g. lines to a zoo plot?
Hi all, a problem I encounter again and again: I plot a zoo object using "plot" and then want to add lines or points to this plot. I usually circumvent this problem by adding artificial coloumns to the zoo object before plotting, but I am sure there's a better solution. To be specific: Assume I did x <-
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest patched proftpd distribution. -- Jez http://www.munk.nu/ -------------- next part -------------- An embedded message was scrubbed... From: Dave Ahmad <da@securityfocus.com> Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd) Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT) Size: 4588 Url:
1996 Dec 16
0
Re: vixie-crontab for redhat linux (Fix)
[Mod: Sent to linux-security instead of linux alert -- alex] Dave G. <daveg@ESCAPE.COM> wrote: > /* vixie crontab buffer overflow for RedHat Linux > * > * I dont think too many people know that redhat uses vixie crontab. > * I didn''t find this, just exploited it. The vulnerability involves an unguarded sscanf call in env.c. Enlarging the buffer to the largest
2007 May 17
0
CESA-2007:0345 Moderate CentOS 3 i386 vixie-cron - security update
CentOS Errata and Security Advisory CESA-2007:0345 vixie-cron security update for CentOS 3 i386: https://rhn.redhat.com/errata/RHSA-2007-0345.html The following updated file has been uploaded and is currently syncing to the mirrors: i386: updates/i386/RPMS/vixie-cron-4.1-19.EL3.i386.rpm source: updates/SRPMS/vixie-cron-4.1-19.EL3.src.rpm You may update your CentOS-3 i386 installations by
2007 May 17
0
CESA-2007:0345 Moderate CentOS 3 x86_64 vixie-cron - security update
CentOS Errata and Security Advisory CESA-2007:0345 vixie-cron security update for CentOS 3 x86_64: https://rhn.redhat.com/errata/RHSA-2007-0345.html The following updated file has been uploaded and is currently syncing to the mirrors: x86_64: updates/x86_64/RPMS/vixie-cron-4.1-19.EL3.x86_64.rpm source: updates/SRPMS/vixie-cron-4.1-19.EL3.src.rpm You may update your CentOS-3 x86_64
2006 Mar 15
0
CESA-2006:0117 Low CentOS 3 i386 vixie-cron - security update
CentOS Errata and Security Advisory CESA-2006:0117 vixie-cron security update for CentOS 3 i386: https://rhn.redhat.com/errata/RHSA-2006-0117.html The following updated file has been uploaded and is currently syncing to the mirrors: i386: updates/i386/RPMS/vixie-cron-4.1-10.EL3.i386.rpm source: updates/SRPMS/vixie-cron-4.1-10.EL3.src.rpm You may update your CentOS-3 i386 installations by
2006 Mar 15
0
CESA-2006:0117 Low CentOS 3 x86_64 vixie-cron - security update
CentOS Errata and Security Advisory CESA-2006:0117 vixie-cron security update for CentOS 3 x86_64: https://rhn.redhat.com/errata/RHSA-2006-0117.html The following updated file has been uploaded and is currently syncing to the mirrors: x86_64: updates/x86_64/RPMS/vixie-cron-4.1-10.EL3.x86_64.rpm source: updates/SRPMS/vixie-cron-4.1-10.EL3.src.rpm You may update your CentOS-3 x86_64
2006 Jul 18
2
Vulnerability in vixie cron?
Hi, Recently there have been advisories and patches for SuSE and RedHat (and probably a few others) regarding a vulnerability in Vixie Cron. The details say that there's insufficient checking of the return value of setuid, which can lead to priviledge escalation and lets users run cron jobs with root priviledges. As far as I know, FreBSD also uses Vixie Cron (at least the cron(8) manpage
1998 Feb 05
0
vixie cron 3.0.1 continued
The problem with vixie cron is wider (and more funny) than I expected. Here''s my proggy which allows hiding files of any kind and size into crontab entries (remember, quota is ignored ;-): -- cron_put -- #!/bin/bash echo "Vixie cron 3.0.1 file storage - put utlility" echo "by Michal Zalewski <lcamtuf@staszic.waw.pl>" echo if [ "$1" = "" ];
2005 Oct 07
1
dependency conflict on vixie-cron update
I'm having a problem with the new vixie-cron rpm for CentOS 4.1 when updating via yum. It complains with the message: Error: Missing Dependency: pam >= 0.77-66.8 is needed by package vixie-cron I got this error from calling 'yum update' on a clean install from the 4.1 isos. This version of pam is available in the 4.2 beta repository, but not the 4.1 repository. Did something