Displaying 20 results from an estimated 2000 matches similar to: "tty chowning"
1997 Sep 27
0
x-kernel@vger.rutgers.edu
Subject: Re: tty chowning
Newsgroups: mail.linux.kernel
In-Reply-To: <199709261901.PAA04763@dcl.MIT.EDU>
Organization:
Cc:
Bcc:
"Theodore Y. Ts''o" <tytso@MIT.EDU> writes:
> David Holland <dholland@eecs.harvard.edu> writes:
> } Why not build chowning into this process? On TIOCSCTTY, the tty would
> } chown itself to the
1997 Sep 22
1
rwhod is naive
It seems that when you send rwhod an rwho packet, it blindly assumes
you are who the packet says you are. That is to say, it looks as if
any host can inject false rwho data for any other host.
I''m not convinced this is worth fixing. Opinions?
--
- David A. Holland | VINO project home page:
dholland@eecs.harvard.edu | http://www.eecs.harvard.edu/vino
1997 Jan 18
0
write(1) leak
Some versions (the util-linux version, but not the netwrite or netkit
versions) of /usr/bin/write have a buffer overrun problem that is
almost certainly exploitable. Note that this gives access to the tty
group, but not (directly) root.
The fix is to change the two sprintfs to snprintfs. Patches have been
mailed to the maintainer.
--
- David A. Holland | VINO project home page:
1996 Dec 07
0
Old sendmail advisory
> ==========================================================================
> CERT(sm) Advisory CA-96.20
> Original issue date: September 18, 1996
> Last revised: --
>
> Topic: Sendmail Vulnerabilities
> --------------------------------------------------------------------------
> *** This advisory supersedes CA-95:05 ***
Just a word of warning -
1996 Nov 10
0
xterm
I guess I never sent the message I was going to last week about xterm.
[Noteto REW: If I did, kill this message...]
It seems that sending xterm an excessively long escape sequence kills
it (and perchance might be made to hack it, which would be quite bad.)
The xterm in XFree86-3.2 is immune to this problem. I recommend
everyone upgrade ASAP.
--
- David A. Holland | VINO
1997 Jan 12
9
dos-attack on inetd.
Hi.
I don''t know if this one is known, but I can''t recall seeing anything
about it. If it is old news I apologize.
I discovered a bug in the inetd that comes with NetKit-B-0-08 and older.
If a single SYN is sent to port 13 of the server, inetd will die of Broken
Pipe:
write(3, "Sun Jan 12 21:50:35 1997\r\n", 26) = -1 EPIPE (Broken pipe)
--- SIGPIPE (Broken pipe) ---
1997 Jan 02
2
Re: libc bugs (was Re: Distributions...)
Marek Michalkiewicz <marekm@I17LINUXB.ISTS.PWR.WROC.PL> wrote:
: It seems that most of the RedHat 5.3.12 security patches are in the
: standard 5.4.17, except for the patch below. Also, there are more
: (different) fixes in 5.4.18 (check h_length against sizeof(sin_addr)
: in inet/rcmd.c and inet/rexec.c).
: + {
: +
1997 Sep 16
8
Re: Security Concern..
[Mod: This message is a reason *why* linux-security is moderated list. This
is also a reason why Rogier, myself, Alan Cox and others really do not want
to have completely open lists that deal with security related aspects of
running a system as way too many people just jump to conclusions and give
suggestions without doing any reasearch on a subject. -- alex (co-moderator
of
1997 Oct 22
1
SNI-20: Telnetd tgetent vulnerability
[mod: Executive summary: SNI found recent linux-distributions
not-vulnerable -- REW]
-----BEGIN PGP SIGNED MESSAGE-----
###### ## ## ######
## ### ## ##
###### ## # ## ##
## ## ### ##
###### . ## ## . ######.
1997 Mar 22
2
"Secure" tftpd source for Linux?
I''ve been poking around my system, and realized that having a tftp server
would be handy. (I''m working with cisco routers, which have the capability to
up and download configuration images via tftp.)
However, I''m not content with the usual tftpd that comes with Linux. The
whole "specify each directory you want" scheme is cock-eyed to me. I''d
prefer
2002 Aug 28
5
Tru64 privsep patch testing
OK, I got a chance to try out the Tru64 patch for privsep. I applied the patch
to 3.4p1. Partial success, in that it now works for me for logins to "root".
Logins to ordinary accounts fail after authentication, when trying to set tty
characteristics. See the excerpt from the debug messages below. This is for
Tru64 V4.0F (with enhanced_security turned on, obviously.) I guess it's time
1997 Apr 24
1
/dev/random and MAKEDEV-C-1.6
[Note: this has already been sent to comp.os.linux.announce.]
-----BEGIN PGP SIGNED MESSAGE-----
It has come to my attention that the recent 1.6 release of MAKEDEV-C
inadvertently created /dev/random and /dev/urandom with the wrong
permissions.
/dev/random and /dev/urandom should look like this:
crw-r--r-- 1 root system 1, 8 Feb 21 14:42 /dev/random
crw-r--r-- 1 root system
2003 Apr 05
5
[Bug 536] no access to tty on Linux 2.0
http://bugzilla.mindrot.org/show_bug.cgi?id=536
Summary: no access to tty on Linux 2.0
Product: Portable OpenSSH
Version: 3.6p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: jfeise at
2001 Apr 05
0
HP-UX 9 problems (hangs on logout; tty isn't sane)
I'm trying to get OpenSSH 2.5.2p2 to run on HP-UX 9.05. I've had some
decent results, but I'm also seeing some problems.
I'm using the EGD (I configured with --with-prngd-socket=/tmp/entropy).
* Compiling required some changes, which I've attached. Two of the
changes are "hackish", and not at all suited to inclusion in the
source tree, but they might point
2000 Dec 06
1
openssh-2.3.0p1 (Linux) fails using options with dss key
I'm trying to change my local setup from ssh2 to openssh-2.3.0p1. I need
captive comands and specific environments for each key, i.e. the
"command=XXX" and "environment=X=y" options. Unfortunately I *also* need
to support the existing ssh2 client for a transition period, since it's
impractical to change all user's environments to openssh in one go.
I have converted
2002 May 22
1
error: ioctl(TIOCSCTTY)
Hi there
I've just upgraded to openssh-3.2.2p1 from openssh-1.2.3 and am having
some difficulties.
On one of the platforms I'm using (linux kernel 2.2.19 with glibc 2.1.1)
it works fine, but on another (linux kernel 2.2.20 with glibc 2.0.7) I get
this in the syslog every time I log in:
sshd[12277]: Accepted publickey for root from 212.38.67.158 port 2397 ssh2
PAM_pwdb[12277]: (sshd)
2015 Apr 21
0
CentOS 7 and vino
I am trying to get vino going on CentOS 7.1
I run this command:
gsettings set org.gnome.Vino require-encryption false
Then this one:
gsettings list-recursively org.gnome.Vino
org.gnome.Vino notify-on-connect true
org.gnome.Vino alternative-port uint16 5900
org.gnome.Vino disable-background false
org.gnome.Vino use-alternative-port false
org.gnome.Vino icon-visibility 'client'
1997 Jan 29
5
evidence/timelines that show linux is "more secure"
I''m looking for some evidence, backup up with dates and references,
that shows that the Linux community responds to security problems
more quickly than other OS vendors, and thus might be considered
"more secure". A number of fairly high profile corporations are
starting to look for such information as they consider Linux as an
alternative solution to other UNIXes.
Something
2017 Apr 03
2
[PATCH supermin] init: Don't perform ioctl (TIOCSCTTY).
Don't know why it works, but it works ...
Rich.
2017 Apr 03
0
[PATCH supermin] init: Don't perform ioctl (TIOCSCTTY).
Doing this breaks bash in virt-rescue with the error:
bash: cannot set terminal process group (-1): Inappropriate ioctl for device
bash: no job control in this shell
Also ^C etc does not work.
Removing this ioctl call fixes this.
I noticed the problem because supermin's init compiled with dietlibc
worked, since the dietlibc header files don't define TIOCSCTTY and
hence the ioctl