similar to: An old ld-linux.so hole

Displaying 20 results from an estimated 4000 matches similar to: "An old ld-linux.so hole"

2018 Jun 13
1
2.3.1 Replication is throwing scary errors
Hey all, almost 48h ago I upgraded both my instances to 2.3.1 again to see if the new patches would fix the replication issues for me. So far, the result is: great. I haven't been able to provoke any kind of I/O stall or persisting queued/failed resync requests in my replication setup. Newly added users are replicated instantly upon the first received mails and the home directory gets
2011 Jan 05
1
e-pub or downloadable xhtml of the manuals?
http://samba.org/samba/docs/man/Samba-HOWTO-Collection/ This document has provided more information to me than I can adequately express, and as masochistic as it sounds, I'd kinda like to pop a copy on my nook and devour it. along with any of the other docs hosted on the samba website. has anyone prepared epubs of the documentation? if not epubs, than at least xhtml files in a zip
2010 Jul 15
1
Error using the mi package
I'm trying to impute data using the mi package, but after running through almost the entire first round of imputations (which takes quite a while), it throws this error (I'll include the whole output prior to the error for context). Does anyone know what is causing it, or how I can fix it? More specifically, how can I tell what is throwing the error so I know what to fix? Is
2006 Jun 26
1
Dispatch.fcgi h-e-double hockey sticks...
Hello Everyone ~ Last week I started having a dispatch.fcgi process go out of control on my Linux server. If I don''t catch it the process will eat my RAM, and devour my swap file until the machine becomes non-responsive. I am running Lighttpd and have not had any issues until lately. The logs are not telling me anything useful, and as a quick fix I am running the site using Mongrel,
2018 Jan 07
2
CentOS 7.4 fails to boot as Xen PV guest: resurfaces (now also) with centosplus kernel 693.11.6.el7
Dear all, Maybe I'm the only one - so before filing it as a bug: it appears that the latest set of kernel patches in 3.10.0-693.11.6.el7 makes issue 0013763 "CentOS 7.4 kernel (3.10.0-693*) fails to boot as Xen PV guest" re-surface *also* with the CentOS PLUS kernel. But maybe in a different way ... Thanks to the (great!) quick work on making the plus kernel available (in #14330,
2006 Nov 19
0
Security hole #2: Off-by-one buffer overflow with mmap_disable=yes
Version: 1.0test53 .. 1.0.rc14 (ie. all 1.0alpha, 1.0beta and 1.0rc versions so far). 0.99.x versions are safe (they don't even have mmap_disable setting). Problem: When mmap_disable=yes setting is used, dovecot.index.cache file is read to memory using "file cache" code. It contains a "mapped pages" bitmask buffer. In some conditions when updating the buffer it allocates
2006 Nov 19
0
Security hole #2: Off-by-one buffer overflow with mmap_disable=yes
Version: 1.0test53 .. 1.0.rc14 (ie. all 1.0alpha, 1.0beta and 1.0rc versions so far). 0.99.x versions are safe (they don't even have mmap_disable setting). Problem: When mmap_disable=yes setting is used, dovecot.index.cache file is read to memory using "file cache" code. It contains a "mapped pages" bitmask buffer. In some conditions when updating the buffer it allocates
1997 May 14
0
Security hole in Elm...
>---------- Forwarded message ---------- >Date: Tue, 13 May 1997 21:18:33 +0200 >From: Wojciech Swieboda <wojtek@ajax.umcs.lublin.pl> >To: BUGTRAQ@NETSPACE.ORG > >Hello, > I''ve lately found an overflow vulnerability in Elm (Elm is setgid >mail on linux, and perhaps on some other platforms aswell). I''ve tested >this bug on versions 2.3 and
2000 Oct 02
0
(from BugTraq) openssh2.2.p1 - Re: scp file transfer hole
X-PMC-CI-e-mail-id: 13726 Hi, I have been a successful user of Openssh for some time. I am attaching two articles from BugTraq. Hopefully, they show exactly the security problems reported in the BugTraq mailing list. [Pity that no one seemed to have bothered to contact the mailing list(s) for openssh development.] I am not sure what the right fixes would be. But at least, people need to be
2008 Mar 09
0
Security hole #6: Some passdbs allowed users to log in without a valid password
This affects only blocking passdbs: - MySQL - PAM, passwd and shadow if blocking=yes The underlying bug exists in all v1.0.x versions, but I couldn't figure out a way to exploit it except with v1.0.11, v1.0.12 and v1.1.rc2. Probably a good idea to upgrade in any case. The main problem is that Dovecot's internal protocols use TAB character as a delimiter, but passwords were sent
2008 Mar 09
0
Security hole #6: Some passdbs allowed users to log in without a valid password
This affects only blocking passdbs: - MySQL - PAM, passwd and shadow if blocking=yes The underlying bug exists in all v1.0.x versions, but I couldn't figure out a way to exploit it except with v1.0.11, v1.0.12 and v1.1.rc2. Probably a good idea to upgrade in any case. The main problem is that Dovecot's internal protocols use TAB character as a delimiter, but passwords were sent
2004 Aug 12
0
security hole in non-chroot rsync daemon
SUMMARY There is a path-sanitizing bug that affects daemon mode in all recent rsync versions (including 2.6.2) but only if chroot is disabled. It does NOT affect the normal send/receive filenames that specify what files should be transferred (this is because these names happen to get sanitized twice, and thus the second call removes any lingering leading slash(es) that the first call left
1998 Jun 25
0
security hole in mailx
Hi there. I''ve discovered a rather serious security hole in mailx, the good old Berkeley mail program. It''s somehow present at least in the last versions I''ve checked (mailx-8.1.1 in Linux, mailx 5.0 in Solaris). The bug is an exploitable buffer overflow (using the HOME environment variable) that allows any local user to acquire the privileges under which the program
2009 Nov 19
1
[PATCH] (Alternate?) locking patch
-- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones virt-df lists disk usage of guests without needing to install any software inside the virtual machine. Supports Linux and Windows. http://et.redhat.com/~rjones/virt-df/ -------------- next part -------------- >From d6bd9f635307f09bc7ce247ccbebeafc519f2bfb Mon Sep 17 00:00:00 2001 From: Richard Jones <rjones at
1997 Apr 23
0
Linux squake security hole (provides root if squake is installed mode 4755)
I''ll just include the letter that I sent to John Carmack and Dave "Zoid" Kirsch concerning this problem. ---------------------------------------------------------------------- From: Greg Alexander <galexand@sietch.bloomington.in.us> Approved: R.E.Wolff@BitWizard.nl To: zoid@threewave.com cc: johnc@idsoftware.com Subject: Security hole in squake. Please respond with this
2009 Apr 03
3
Adding Sieve Extensions
How can I add an extension to Dovecot's Sieve implementation? I would like to use 'editheader' and 'redirect'. Thank you! James
2008 May 18
5
Security Hole in 1.0.13?
I'm running 1.0.13 If I run dovecot for a while, I see a /var/run/dotvecot folder created with the following: drwxr-xr-x 3 root root 4096 2008-05-18 13:30 dotvecot drwxr-xr-x 3 root root 4096 2008-05-18 13:47 . drwxr-xr-x 18 root root 4096 2008-05-18 13:47 .. srw------- 1 root root 0 2008-05-18 13:47 auth-worker.15138 srwxrwxrwx 1 root root 0
1997 Mar 02
1
imapd and ipop3d hole
###### ## ## ###### ## ### ## ## ###### ## # ## ## ## ## ### ## ###### . ## ## . ######. Secure Networks Inc. Security Advisory March 2, 1997
1997 Jul 24
0
Security hole in mgetty+sendfax
-----BEGIN PGP SIGNED MESSAGE----- Hi, a security hole has been found in the auxiliary fax scripts "faxq" and "faxrunq" in the mgetty+sendfax package. It has been in there since the first day those scripts were written. Due to improper quoting in these shell scripts, it''s possible to execute code with a foreign user id, and get root access to the machine. The
2004 Aug 06
1
Why doesn't yp.icecast.org show my stream?
Jack Moffitt <jack@xiph.org> writes: > Now I see the problem. This will not cause anything to show up. You > have no sources. Eh? -> sources Listing sources [Id: 509] [Sock: 14] [Time of connect: 18/Feb/2002:20:55:14] [IP: 205.147.43.110] [State: 1] [Type: pulling relay] [Proto: x-audiocast] [Clients: 2] [Dumpfile/fd: (null)/-1] [Priority: 0] [Song Title: ] [Song URL: