Displaying 20 results from an estimated 3000 matches similar to: "[RHSA-2000:037-01] New Linux kernel fixes security bug"
2000 Jun 21
0
[RHSA-2000:037-02] New Linux kernel fixes security bug
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New Linux kernel fixes security bug
Advisory ID: RHSA-2000:037-01
Issue date: 2000-06-20
Updated on: 2000-06-20
Product: Red Hat Linux
Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID Acenic
Cross
2000 Jun 26
0
[RHSA-2000:037-05] New Linux kernel fixes security bug
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New Linux kernel fixes security bug
Advisory ID: RHSA-2000:037-05
Issue date: 2000-06-20
Updated on: 2000-06-26
Product: Red Hat Linux
Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID Acenic
Cross
2000 Jun 23
1
Security Update: wu-ftpd vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: wu-ftpd vulnerability
Advisory number: CSSA-2000-020.0
Issue date: 2000 June, 23
Cross reference:
______________________________________________________________________________
1. Problem Description
There is
2000 Jun 14
0
Security Advisory: local ROOT exploit in BRU
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: local ROOT exploit in BRU
Advisory number: CSSA-2000-018.0
Issue date: 2000 June, 14
Cross reference:
______________________________________________________________________________
1. Problem Description
2001 Nov 02
0
[RHSA-2001:142-15] kernel 2.2 and 2.4: syncookie vulnerability
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory
Synopsis: kernel 2.2 and 2.4: syncookie vulnerability
Advisory ID: RHSA-2001:142-15
Issue date: 2001-10-26
Updated on: 2001-11-02
Product: Red Hat Linux
Keywords: syncookie security kernel
Cross references:
Obsoletes:
2001 Oct 18
0
[RHSA-2001:130-04] New kernel 2.2 packages are available
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory
Synopsis: New kernel 2.2 packages are available
Advisory ID: RHSA-2001:130-04
Issue date: 2001-10-09
Updated on: 2001-10-16
Product: Red Hat Linux
Keywords: ptrace local root kernel
Cross references:
Obsoletes:
2001 Nov 06
0
Security Update: [CSSA-2001-38.0] Linux - syncookies firewall breaking problem
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera International, Inc. Security Advisory
Subject: Linux - syncookies firewall breaking problem
Advisory number: CSSA-2001-038.0
Issue date: 2001, November 05
Cross reference:
______________________________________________________________________________
1.
1999 Sep 13
0
[RHSA-1999:037-01] Buffer overflow in mars_nwe
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow in mars_nwe
Advisory ID: RHSA-1999:037-01
Issue date: 1999-09-13
Updated on:
Keywords: mars_nwe buffer
Cross references:
---------------------------------------------------------------------
1. Topic:
There are several buffer overruns in the mars_nwe
2001 Oct 18
0
Security Update: [CSSA-2001-036.0] Linux - Several Linux Kernel Security Problems
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera International, Inc. Security Advisory
Subject: Linux - several linux kernel security problems
Advisory number: CSSA-2001-036.0
Issue date: 2001, October 18
Cross reference:
______________________________________________________________________________
2000 Jul 21
0
[RHSA-2000:043-03] Revised advisory: Updated package for nfs-utils available
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Revised advisory: Updated package for nfs-utils available
Advisory ID: RHSA-2000:043-03
Issue date: 2000-07-17
Updated on: 2000-07-21
Product: Red Hat Linux
Keywords: rpc.statd root compromise
Cross references: N/A
2001 Nov 26
1
EXT3 crash: ext3_free_blocks: bit already cleared
I had a failure over the weekend of
my ext3 filesystems.
Hardware:
Dell 2550 (dual PIII 1 Ghz, 1GB ram, Acenic GigE card)
Software:
linux-2.4.14
ext3-2.4-0.9.15-2414
Trond's NFS patches (pathconf, tune,read,rpc_blk)
The filesystem is RAID0 using LVM (1.0.1-rc4).
The disks are connected using fiber channel
(qlogic 2200, qlax00-4.27beta).
I was generating high load on my nfs
2010 Feb 02
0
[LLVMdev] target triples
Hi!
I just wonder why the target triples are not target pairs of the
form "ProcessorType-ABI", e.g. "i686-iBCS"
As I'm still new to llvm perhaps someone likes to explain
what the target triple influences.
Thanks
-Jochen
2004 Sep 20
1
ZapRTC loading problems
I finally got 2.4 recompiled with RTC as a module:
Module Size Used by Not tainted
autofs 13684 0 (autoclean) (unused)
acenic 241092 0 (unused)
iptable_filter 2412 0 (autoclean) (unused)
ip_tables 15864 1 [iptable_filter]
e100 62340 1
rtc 9084 0 (autoclean)
Here is my
2000 Oct 31
1
(no subject)
New EXT3 Packages have been uploaded to ftp.beta.redhat.com today. We have
expanded the packages offering by popular request :-) You may download these
packages via anonymous ftp, or via the web page at http://www.beta.redhat.com/.
BUGS
Bugs against these packages should still be posted at bugzilla.redhat.com
Product: Red Hat High Availability Server
Version: beta
Component: ext3
2001 Dec 06
1
2.2.19: Assertion failure in ext3_new_block() at balloc.c line 709
Red Hat 2.2.19-6.2.12
+ 0.0.7a
+ https://listman.redhat.com/pipermail/ext3-users/2001-November/002258.html
(not tuned in /proc yet)
+ journal 4MB on each fs
+ 6 ext3 fs on raid1 (hda+hdc)
+ 1 ext3 fs on another disk not on raid1 (hdd)
While untarring (tar zxf) a file that was on a ext3/raid1 onto hdd I got:
ksymoops 2.3.4 on i686 2.2.19-6.2.12.g1. Options used
-V (default)
-k
2002 Feb 12
1
2.4.17: BUG()at transaction.c:609
very modular 2.4.17; 2xPIII-800; no HIGHMEM; gcc-2.96-98; all ext3;
modules loaded include autofs4, nfs, nfsd, eepro100, acenic, ipchains,
unix, gdth. This happened during the dump (incrcp.pl is a custom backup
script also happening at the time).
Does ext3-0.9.17 fix this?
kernel BUG at transaction.c:609!
invalid operand: 0000
CPU: 1
EIP:
2005 Jan 14
0
OT: zaptel kernel mod
I don't have any card specific modules loaded. I don't have chan_zap loaded.
So how can the zaptel kernel module show usage? I just rebooted this server
due to defunct asterisk process.
How can I find out what 4 things are using zaptel?
[root@asterisk localhost]# lsmod
Module Size Used by Not tainted
parport_pc 19204 1 (autoclean)
lp
2003 Aug 16
1
update: Win2kPro's TCP/IP Stack is crippled!
I've been doing some testing between Windows 2000 Pro (SP4) and Windows 2000
Server (no SP and SP4) -- specifcally testing file transfers from a Samba
2.2.8a server.
Samba server: P4/2.2GHz, ServerWorks chipset, SCSI UW2 disk subsystem
(Bonnie++ tested to 35MB/sec), 3Com (acenic) gigabit ethernet
Win2kPro: P3/700, 3Com Vortex 100mbit network card
Win2kServer: P3/800, 3Com Vortex 100mbit
2007 Apr 18
1
[Bridge] Performance problem with linux bridge ... compare kernel 2.6.13.4 to 2.6.15.1
With kernel 2.6.13.4 linux bridge with traffic management for 4000users
and 20.4 MB/s(tx)/22.4 MB/s(rx) data load of CPU is max 50%
With kernel 2.6.15.1 the same linux bridge with the same traffic has
100% CPU load and in top I have ksoftirqd proccess.
The machine is P4 3.2 GHz with 1GB of ram and 4 NetGear 620 cards
The config is:
/sbin/modprobe acenic link=0x0100,0x0100,0x0100,0x0100
2007 Apr 18
0
[Bridge] My hotmail login issue is fixed!!
Hi All,
Today is a great day. My hotmail login error is fixed.
Following Peter's advice, I used e1000 card, don't change any MTU , the
hotmail login error went away! It is MTU issue, for VLAN tag traffice
going through the bridge, the NICs in the bridge need support VLAN tag,
e100/e1000 card can.
Thanks to Peter, Stephen Hemminger, and All !
So far I know Intel e100/e1000 card can