Displaying 20 results from an estimated 4000 matches similar to: "An old ld-linux.so hole"
2018 Jun 13
1
2.3.1 Replication is throwing scary errors
Hey all,
almost 48h ago I upgraded both my instances to 2.3.1 again to see if
the new patches would fix the replication issues for me.
So far, the result is: great.
I haven't been able to provoke any kind of I/O stall or persisting
queued/failed resync requests in my replication setup.
Newly added users are replicated instantly upon the first received
mails and the home directory gets
2011 Jan 05
1
e-pub or downloadable xhtml of the manuals?
http://samba.org/samba/docs/man/Samba-HOWTO-Collection/
This document has provided more information to me than I can adequately
express, and as masochistic as it sounds, I'd kinda like to pop a copy
on my nook and devour it. along with any of the other docs hosted on
the samba website. has anyone prepared epubs of the documentation? if
not epubs, than at least xhtml files in a zip
2010 Jul 15
1
Error using the mi package
I'm trying to impute data using the mi package, but after running
through almost the entire first round of imputations (which takes
quite a while), it throws this error (I'll include the whole output
prior to the error for context). Does anyone know what is causing it,
or how I can fix it?
More specifically, how can I tell what is throwing the error so I know
what to fix? Is
2006 Jun 26
1
Dispatch.fcgi h-e-double hockey sticks...
Hello Everyone ~
Last week I started having a dispatch.fcgi process go out of control on my
Linux server. If I don''t catch it the process will eat my RAM, and devour
my swap file until the machine becomes non-responsive. I am running
Lighttpd and have not had any issues until lately.
The logs are not telling me anything useful, and as a quick fix I am running
the site using Mongrel,
2018 Jan 07
2
CentOS 7.4 fails to boot as Xen PV guest: resurfaces (now also) with centosplus kernel 693.11.6.el7
Dear all,
Maybe I'm the only one - so before filing it as a bug: it appears that
the latest set of kernel patches in 3.10.0-693.11.6.el7 makes issue
0013763 "CentOS 7.4 kernel (3.10.0-693*) fails to boot as Xen PV guest"
re-surface *also* with the CentOS PLUS kernel. But maybe in a
different way ...
Thanks to the (great!) quick work on making the plus kernel available
(in #14330,
2006 Nov 19
0
Security hole #2: Off-by-one buffer overflow with mmap_disable=yes
Version: 1.0test53 .. 1.0.rc14 (ie. all 1.0alpha, 1.0beta and 1.0rc
versions so far).
0.99.x versions are safe (they don't even have mmap_disable setting).
Problem: When mmap_disable=yes setting is used, dovecot.index.cache file
is read to memory using "file cache" code. It contains a "mapped pages"
bitmask buffer. In some conditions when updating the buffer it allocates
2006 Nov 19
0
Security hole #2: Off-by-one buffer overflow with mmap_disable=yes
Version: 1.0test53 .. 1.0.rc14 (ie. all 1.0alpha, 1.0beta and 1.0rc
versions so far).
0.99.x versions are safe (they don't even have mmap_disable setting).
Problem: When mmap_disable=yes setting is used, dovecot.index.cache file
is read to memory using "file cache" code. It contains a "mapped pages"
bitmask buffer. In some conditions when updating the buffer it allocates
1997 May 14
0
Security hole in Elm...
>---------- Forwarded message ----------
>Date: Tue, 13 May 1997 21:18:33 +0200
>From: Wojciech Swieboda <wojtek@ajax.umcs.lublin.pl>
>To: BUGTRAQ@NETSPACE.ORG
>
>Hello,
> I''ve lately found an overflow vulnerability in Elm (Elm is setgid
>mail on linux, and perhaps on some other platforms aswell). I''ve tested
>this bug on versions 2.3 and
2000 Oct 02
0
(from BugTraq) openssh2.2.p1 - Re: scp file transfer hole
X-PMC-CI-e-mail-id: 13726
Hi,
I have been a successful user of Openssh for some time.
I am attaching two articles from BugTraq.
Hopefully, they show exactly the security problems
reported in the BugTraq mailing list.
[Pity that no one seemed to have bothered to contact the
mailing list(s) for openssh development.]
I am not sure what the right fixes would be.
But at least, people need to be
2008 Mar 09
0
Security hole #6: Some passdbs allowed users to log in without a valid password
This affects only blocking passdbs:
- MySQL
- PAM, passwd and shadow if blocking=yes
The underlying bug exists in all v1.0.x versions, but I couldn't figure
out a way to exploit it except with v1.0.11, v1.0.12 and v1.1.rc2.
Probably a good idea to upgrade in any case.
The main problem is that Dovecot's internal protocols use TAB character
as a delimiter, but passwords were sent
2008 Mar 09
0
Security hole #6: Some passdbs allowed users to log in without a valid password
This affects only blocking passdbs:
- MySQL
- PAM, passwd and shadow if blocking=yes
The underlying bug exists in all v1.0.x versions, but I couldn't figure
out a way to exploit it except with v1.0.11, v1.0.12 and v1.1.rc2.
Probably a good idea to upgrade in any case.
The main problem is that Dovecot's internal protocols use TAB character
as a delimiter, but passwords were sent
2004 Aug 12
0
security hole in non-chroot rsync daemon
SUMMARY
There is a path-sanitizing bug that affects daemon mode in all recent
rsync versions (including 2.6.2) but only if chroot is disabled. It
does NOT affect the normal send/receive filenames that specify what
files should be transferred (this is because these names happen to get
sanitized twice, and thus the second call removes any lingering leading
slash(es) that the first call left
1998 Jun 25
0
security hole in mailx
Hi there.
I''ve discovered a rather serious security hole in mailx, the good
old Berkeley mail program. It''s somehow present at least in the
last versions I''ve checked (mailx-8.1.1 in Linux, mailx 5.0 in
Solaris). The bug is an exploitable buffer overflow (using the
HOME environment variable) that allows any local user to acquire
the privileges under which the program
2009 Nov 19
1
[PATCH] (Alternate?) locking patch
--
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
virt-df lists disk usage of guests without needing to install any
software inside the virtual machine. Supports Linux and Windows.
http://et.redhat.com/~rjones/virt-df/
-------------- next part --------------
>From d6bd9f635307f09bc7ce247ccbebeafc519f2bfb Mon Sep 17 00:00:00 2001
From: Richard Jones <rjones at
1997 Apr 23
0
Linux squake security hole (provides root if squake is installed mode 4755)
I''ll just include the letter that I sent to John Carmack and Dave "Zoid"
Kirsch concerning this problem.
----------------------------------------------------------------------
From: Greg Alexander <galexand@sietch.bloomington.in.us>
Approved: R.E.Wolff@BitWizard.nl
To: zoid@threewave.com
cc: johnc@idsoftware.com
Subject: Security hole in squake.
Please respond with this
2009 Apr 03
3
Adding Sieve Extensions
How can I add an extension to Dovecot's Sieve implementation?
I would like to use 'editheader' and 'redirect'.
Thank you!
James
2008 May 18
5
Security Hole in 1.0.13?
I'm running 1.0.13
If I run dovecot for a while, I see a /var/run/dotvecot folder created
with the following:
drwxr-xr-x 3 root root 4096 2008-05-18 13:30 dotvecot
drwxr-xr-x 3 root root 4096 2008-05-18 13:47 .
drwxr-xr-x 18 root root 4096 2008-05-18 13:47 ..
srw------- 1 root root 0 2008-05-18 13:47 auth-worker.15138
srwxrwxrwx 1 root root 0
1997 Mar 02
1
imapd and ipop3d hole
###### ## ## ######
## ### ## ##
###### ## # ## ##
## ## ### ##
###### . ## ## . ######.
Secure Networks Inc.
Security Advisory
March 2, 1997
1997 Jul 24
0
Security hole in mgetty+sendfax
-----BEGIN PGP SIGNED MESSAGE-----
Hi,
a security hole has been found in the auxiliary fax scripts "faxq" and
"faxrunq" in the mgetty+sendfax package. It has been in there since
the first day those scripts were written.
Due to improper quoting in these shell scripts, it''s possible to execute
code with a foreign user id, and get root access to the machine. The
2004 Aug 06
1
Why doesn't yp.icecast.org show my stream?
Jack Moffitt <jack@xiph.org> writes:
> Now I see the problem. This will not cause anything to show up. You
> have no sources.
Eh?
-> sources
Listing sources
[Id: 509] [Sock: 14] [Time of connect: 18/Feb/2002:20:55:14] [IP:
205.147.43.110] [State: 1] [Type: pulling relay] [Proto: x-audiocast]
[Clients: 2] [Dumpfile/fd: (null)/-1] [Priority: 0] [Song Title: ] [Song URL: