similar to: Fwd: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]

Displaying 20 results from an estimated 200 matches similar to: "Fwd: [Full-Disclosure] Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]"

2003 Sep 17
0
FreeBSD Security Advisory FreeBSD-SA-03:13.sendmail
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-03:13.sendmail Security Advisory The FreeBSD Project Topic: a third sendmail header parsing buffer overflow Category: contrib Module:
2003 Sep 17
0
FreeBSD Security Advisory FreeBSD-SA-03:13.sendmail
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-03:13.sendmail Security Advisory The FreeBSD Project Topic: a third sendmail header parsing buffer overflow Category: contrib Module:
2003 Sep 15
1
Fwd: Re: [Full-Disclosure] new ssh exploit?
Has anyone around here heard of this ? ---Mike >Subject: Re: [Full-Disclosure] new ssh exploit? >From: christopher neitzert <chris@neitzert.com> >Reply-To: chris@neitzert.com >To: full-disclosure@lists.netsys.com >X-Mailer: Ximian Evolution 1.4.3.99 >Sender: full-disclosure-admin@lists.netsys.com >X-BeenThere: full-disclosure@lists.netsys.com
2003 Sep 17
3
Sendmail vulnerability
You've probably already seen the latest sendmail vulnerability. http://lists.netsys.com/pipermail/full-disclosure/2003-September/010287.html I believe you can apply the following patch to any of the security branches: http://cvsweb.freebsd.org/src/contrib/sendmail/src/parseaddr.c.diff?r1=1.1.1.17&r2=1.1.1.18 Download the patch and: # cd /usr/src # patch -p1 < /path/to/patch #
2003 Sep 17
3
Sendmail vulnerability
You've probably already seen the latest sendmail vulnerability. http://lists.netsys.com/pipermail/full-disclosure/2003-September/010287.html I believe you can apply the following patch to any of the security branches: http://cvsweb.freebsd.org/src/contrib/sendmail/src/parseaddr.c.diff?r1=1.1.1.17&r2=1.1.1.18 Download the patch and: # cd /usr/src # patch -p1 < /path/to/patch #
2003 Mar 30
0
FreeBSD Security Advisory FreeBSD-SA-03:07.sendmail
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-03:07.sendmail Security Advisory The FreeBSD Project Topic: a second sendmail header parsing buffer overflow Category: contrib Module:
2003 Mar 30
3
FreeBSD Security Advisory FreeBSD-SA-03:07.sendmail
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-03:07.sendmail Security Advisory The FreeBSD Project Topic: a second sendmail header parsing buffer overflow Category: contrib Module:
2003 Mar 29
1
Security fix (Fwd: sendmail 8.12.9 available
From bugtraq :-( >-----BEGIN PGP SIGNED MESSAGE----- > >Sendmail, Inc., and the Sendmail Consortium announce the availability >of sendmail 8.12.9. It contains a fix for a critical security >problem discovered by Michal Zalewski whom we thank for bringing >this problem to our attention. Sendmail urges all users to either >upgrade to sendmail 8.12.9 or apply a patch for
2020 Apr 21
2
[PATCH] nouveau/hmm: fix nouveau_dmem_chunk allocations
In nouveau_dmem_init(), a number of struct nouveau_dmem_chunk are allocated and put on the dmem->chunk_empty list. Then in nouveau_dmem_pages_alloc(), a nouveau_dmem_chunk is removed from the list and GPU memory is allocated. However, the nouveau_dmem_chunk is never removed from the chunk_empty list nor placed on the chunk_free or chunk_full lists. This results in only one chunk ever being
2001 Jul 02
0
ReleaseLargeFreeVectors SIGSEGV (?) (PR#1008)
Full_Name: Roger Bivand Version: 1.3.0 OS: GNU/Linux RH6.2, 7.0, Debian 2.2 Submission from: (NULL) (158.37.100.64) I'm working on interfacing ANN: A Library for Approximate Nearest Neighbor Searching (http://www.cs.umd.edu/~mount/ANN/) to R, following up a prototype package I tried in May 2000. ANN is written in C++; my C++ is very weak. Last year I didn't experience any problems with
2005 Feb 09
2
full-d] Administrivia: List Compromised due to Mailman Vulnerability (fwd)
Sorry for the cross post, but this is an important one potentially affecting all recipients. This just crossed the Full Disclosure mailman moderated mailing list. It bears a careful read, and thought about whether a response is needed. The implication is that if there is any use of a mailman password in common with a password you 'care' about, you need to take appropriate action at
2006 Mar 22
7
FreeBSD Security Advisory FreeBSD-SA-06:13.sendmail
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-06:13.sendmail Security Advisory The FreeBSD Project Topic: Race condition in sendmail Category: contrib Module: contrib_sendmail Announced:
2019 Mar 21
0
Nouveau dmem NULL Pointer deref (SVM)
On Thu, Mar 21, 2019 at 04:59:14PM +0100, Tobias Klausmann wrote: > Hi, > > just for your information and maybe for some help: with 5.1rc1 and SVM > enabled i see the following backtrace [1] when the nouveau card (reverse > prime) goes to sleep, for now i have papered over with [2] which leaves me > with userspace hangs. Any pointers where to look for the actual culprit? >
2001 Jul 03
0
(PR#1008) SIGSEGV under 1.1.1 too
It looks as though the problem isn't in R - I provoked a SIGSEGV under R 1.1.1 on RH62: > for (i in 1:100) an1 <- ann(cbind(runif(1000), runif(1000)), k = 4) > for (i in 1:100) an1 <- ann(cbind(runif(1001), runif(1001)), k = 4) Program received signal SIGSEGV, Segmentation fault. 0x40111109 in chunk_free (ar_ptr=0x401a5d40, p=0x8849a30) at malloc.c:3111 3111 malloc.c: No such
2002 Jul 03
3
segfault in current cvs
Hello -- Some wav files have been crashing the stuff I checked out from cvs last night. Is this happening to anyone else? Red Hat Linux release 7.3 (Valhalla) Kernel 2.4.18-5 on an i686 gcc-2.96-110 glibc-2.2.5-36 Encoding "04_imiuta.wav" to "04_imiuta.ogg" at quality 1.00 [100.0%] [ 0m00s remaining] \Segmentation fault Program received signal
2001 Oct 03
1
segmentation violation using openssh-2.9.9p2 on linux 2.2.19
I received a segmentation violation whilst using openssh-2.2.9p2 today: Kernel 2.2.19-6.2.7 (Redhat 6.2) Gcc version egcs-2.91.66 glibc-2.1.3-22 Hardware is 333MHz K6-3Dnow with 64MB RAM if that matters Here is what happened along with a stack dump... # ssh -L 80:someplace.net:80 -l charlie someplace.net Password: (works for a while, then seems to freeze) ^C Segmentation violation (core
2000 Apr 17
0
exhaustion and cores
Hello, trying to start tinc I get the following at the client: Apr 17 16:34:50 otto tincd[10238]: tincd 0.3.3 starting, debug level 1. Apr 17 16:34:50 otto tincd[10238]: Generating 128 bits keys. Apr 17 16:34:50 otto tincd[10238]: Ready: listening on port 655. Apr 17 16:34:50 otto tincd[10238]: Connected to xxx Apr 17 16:34:50 otto tincd[10238]: Memory exhausted; exiting. - on a machine with 80
2004 Apr 20
3
[Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
Forwarded message: > From full-disclosure-admin@lists.netsys.com Wed Apr 21 11:49:12 2004 > To: full-disclosure@lists.netsys.com > From: Darren Bounds <dbounds@intrusense.com> > Subject: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability > Date: Tue, 20 Apr 2004 18:19:58 -0400 > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > >
2001 Jan 26
1
[fwd] Ogg123 crash report on EV4 Multia
----- Forwarded message from Telford Tendys <telford@triode.net.au> ----- Delivery-Date: Thu Jan 25 22:22:57 2001 Date: Fri, 26 Jan 2001 16:26:27 +1100 From: Telford Tendys <telford@triode.net.au> To: feedback@vorbis.com Subject: Comments on your code User-Agent: Mutt/1.2.5i Dear Vorbis, I didn't even know about ogg or vorbis until I was at a conference and someone said, ``if
2020 Apr 23
0
[PATCH] nouveau/hmm: fix nouveau_dmem_chunk allocations
On Tue, Apr 21, 2020 at 04:11:07PM -0700, Ralph Campbell wrote: > In nouveau_dmem_init(), a number of struct nouveau_dmem_chunk are allocated > and put on the dmem->chunk_empty list. Then in nouveau_dmem_pages_alloc(), > a nouveau_dmem_chunk is removed from the list and GPU memory is allocated. > However, the nouveau_dmem_chunk is never removed from the chunk_empty > list nor