Displaying 20 results from an estimated 2000 matches similar to: "Forw: SECURITY: various packages updated (pine, mutt, sysklogd, zgv)"
1999 Apr 23
0
Forw: new procmail package
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1999 Apr 23
0
Forw: new lpr package
This and the following 2 messages are from linux-watch@redhatc.com
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW:
1999 Apr 23
0
Forw: rsync correction
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1999 Feb 22
0
Forw: RedHat sysklogd vulnerability
Another from Bugtraq. I've also forwarded this one on to our contact at Red
Hat (Stephen Smoogen) and he tells me it's in their QA currently.
Dan
_______________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L
Fermi National Accelerator
1999 Jun 24
0
Forw: [RHEA-1999:010-01] Update to PHP 3.0.9 (mod_php3)
...and another one.
Of course, if you subscribed to the redhat-watch list then I wouldn't have to
forward these (hint, hint).
;)
Cheers,
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov
1999 Jun 24
0
Forw: [RHSA-1999:015-01] KDE update for Red Hat Linux 6.0
Rogier,
Until we get the list problem solved I'll just forward on the security notices
directly to you.
Cheers,
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi
1999 Jun 17
0
Forw: [RHSA-1999:013-02] New XFree86 packages (updated)
below.
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1999 Jun 17
0
Forw: [RHSA-1999:014-01] New dev, rxvt, screen pacakges for Red Hat Linux 6.0
below.
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1999 Jun 17
0
Forw: [RHSA-1999:013-01] New XFree86 packages for Red Hat Linux 6.0
------- Forwarded Message
Return-Path: redhat-watch-list-request@redhat.com
Received: from lists.redhat.com (lists.redhat.com [199.183.24.247])
by sapphire.fnal.gov (8.8.7/8.8.7) with SMTP id VAA26469
for <yocum@sapphire.fnal.gov>; Wed, 16 Jun 1999 21:19:18 -0500
Received: (qmail 7754 invoked by uid 501); 17 Jun 1999 03:06:01 -0000
Resent-Date: 17 Jun 1999 03:06:01 -0000
Resent-Cc:
1999 Jun 04
0
Forw: 2.2.x kernel vulnerability
below.
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1999 Nov 23
0
DoS with sysklogd, glibc (Caldera) (fwd)
Hi,
This advisory has a bit more than the Red Hat one....
Roger.
----- Forwarded message from Alfred Huger -----
>>From owner-bugtraq@SECURITYFOCUS.COM Mon Nov 22 18:49:41 1999
Approved-By: aleph1@SECURITYFOCUS.COM
Message-ID: <Pine.GSO.4.10.9911220906250.11753-100000@www.securityfocus.com>
Date: Mon, 22 Nov 1999 09:08:08 -0800
X-Reply-To: Alfred Huger
1999 Nov 19
2
[RHSA-1999:055-01] Denial of service attack in syslogd
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Denial of service attack in syslogd
Advisory ID: RHSA-1999:055-01
Issue date: 1999-11-19
Updated on: 1999-11-19
Keywords: syslogd sysklogd stream socket
Cross references: bugtraq id #809
---------------------------------------------------------------------
1. Topic:
A
1999 Aug 27
0
2.0.38 fixes a glitch
Freshmeat says:
Following up to yesterday's Linux 2.0.38 release, Alan Cox sent out a
security notice about a remote network DoS vulnerability which is
present in all Linux 2.0.x systems. Linux 2.2.x is not affected by
this bug. Causing this requires a great deal of skill and probably a
reasonably local network access as it is extremely timing
dependant. Nevertheless everyone is advised to
1999 Oct 21
1
[RHSA-1999:042-01] screen defaults to not using Unix98 ptys
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: screen defaults to not using Unix98 ptys
Advisory ID: RHSA-1999:042-01
Issue date: 1999-10-20
Updated on:
Keywords:
Cross references: screen unix98 pty permissions
---------------------------------------------------------------------
1. Topic:
Screen uses ptys with world
1997 Sep 03
0
Sysklogd''s -r option
sysklogd in RH4.2 always opens a UDP listen socket, even when -r
is not specified on the command line. It doesn''t check the file descriptor
when -r is off though, but the behaviour still irritates the
system administrator greatly (see also the recent bugtraq messages
about this).
Here is a patch to fix this:
--- sysklogd-1.3/syslogd.c-o Wed Sep 3 22:19:26 1997
+++
1999 Oct 12
0
SECURITY: RHSA-1999:040 New PAM packages available
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New PAM packages available
Advisory ID: RHSA-1999:040
Issue date: 10/13/1999
Updated on: 10/13/1999
Keywords: pam security login NIS server
Cross references: N/A
-
1999 Aug 31
0
[SECURITY] RHSA-1999:034 New proftpd packages available
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow in proftpd
Advisory ID: RHSA-1999:034-01
Issue date: 1999-08-31
Keywords: proftpd buffer overflow remote exploit
- ---------------------------------------------------------------------
1. Topic:
proftpd is a ftp server
1999 Mar 25
0
(Fwd) DoS for Linux 2.1.89 - 2.2.3: 0 length fragment bug
Pulled from Bugtraq.
Dan
____________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L
Fermi National Accelerator Lab | email: yocum@fnal.gov /V\ I
P.O. Box 500 | WWW: www-oss.fnal.gov/~yocum/ // \\ N
Batavia, IL
2000 Mar 15
0
Re: IPMASQ and lock-up of all terminals ---- Sum mary and update
Well, last night, my box was hit again.. same symptoms:
All attempts to connect remotely receive a connection, but a login prompt
never comes up.
When I went to the console and turned on the monitor, I had the login
prompt, but written on to the screen was the message
IPMASQ: Reverse ICMP: Checksum error from xxx.xxx.xxx.xxx
So, on this occasion, I thought I would post a summary of the
2005 Jan 14
3
Bug#290511: logcheck: syslogd restart in cron.daily/sysklogd causes a log message
Package: logcheck
Version: 1.2.32
Severity: wishlist
/etc/cron.daily/sysklogd restarts syslogd at the end of the script.
This causes a daily log message, currently missed by logcheck:
Jan 14 06:55:22 pyloric syslogd 1.4.1#16: restart (remote reception).
I'm currently using this regex in ignore.server.d/local-syslogd:
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ syslogd 1\.4\.1#16: restart \(remote