similar to: an anti-overflow wrapper

Displaying 20 results from an estimated 1000 matches similar to: "an anti-overflow wrapper"

2015 Aug 31
0
[PATCH v5 1/2] cat: move get_journal_field to fish/journal.c
--- cat/Makefile.am | 1 + cat/log.c | 114 +------------------------------------------- fish/Makefile.am | 1 + fish/journal.c | 142 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 145 insertions(+), 113 deletions(-) create mode 100644 fish/journal.c diff --git a/cat/Makefile.am b/cat/Makefile.am index d0db6fa..d472100 100644 --- a/cat/Makefile.am +++
2015 Aug 27
0
[PATCH v4 1/2] cat: move get_journal_field to fish/journal.c
--- cat/Makefile.am | 1 + cat/log.c | 113 ++----------------------------------------- fish/Makefile.am | 1 + fish/journal.c | 142 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 147 insertions(+), 110 deletions(-) create mode 100644 fish/journal.c diff --git a/cat/Makefile.am b/cat/Makefile.am index d0db6fa..d472100 100644 --- a/cat/Makefile.am +++
1998 Apr 28
0
[Debian 2.0] /usr/bin/suidexec gives root access
Executive summary: /usr/bin/suidexec gives every user a root shell. Remove it. tlr ----- Forwarded message from Thomas Roessler <roessler@guug.de> ----- Date: Tue, 28 Apr 1998 15:21:17 +0200 From: Thomas Roessler <roessler@guug.de> Subject: suidmanager: SECURITY BREACH: /usr/bin/suidexec gives root access to every user on the system To: submit@bugs.debian.org Package: suidmanager
2015 Mar 03
0
[PATCH v2] fish: add journal-view command
Lets user view journald log from VM in a similar format as journalctl uses. Makes virt-log use the same code as guestfish for journal-view. Fixes RFE: journal reader in guestfish (RHBZ#988100) --- cat/Makefile.am | 1 + cat/log.c | 112 +------------------------------- fish/Makefile.am | 1 + fish/fish.h | 3 + fish/journal.c | 178
2015 Mar 05
0
[PATCH v3] fish: add journal-view command
Lets user view journald log from VM in a similar format as journalctl uses. Makes virt-log use the same code as guestfish for journal-view. Fixes RFE: journal reader in guestfish (RHBZ#988100) --- cat/Makefile.am | 1 + cat/log.c | 113 +------------------------------- fish/Makefile.am | 1 + fish/fish.h | 3 + fish/journal.c | 178
1997 Jul 08
3
so-called snprintf() in db-1.85.4
Hi, There is a severe problem with the db-1.85.4 library''s Linux port that can be found on sunsite.unc.edu under /pub/Linux/libs/db-1.85.4-src.tar.gz (sp?): This library contains a "snprintf" function which breaks down to a common sprintf, ignoring the size parameter. Obviously, this was thought to be a terribly bad work-around for C libraries which don''t contain an
2005 Aug 15
2
recompile sshd with OPIE?
Hi, I'm having trouble getting an answer to the following problem on -questions - I hope someone here has done something similar and can help. I'd like to compile support for FreeBSD OPIE into sshd. Presently I have to use PAM to achieve one-time password support. On a 4.x system I have in /etc/ssh/sshd_config ChallengeResponseAuthentication yes and in /etc/pam.conf sshd auth
1996 Sep 18
1
CERT Advisory CA-96.20 - Sendmail Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= CERT(sm) Advisory CA-96.20 Original issue date: September 18, 1996 Last revised: -- Topic: Sendmail Vulnerabilities - ----------------------------------------------------------------------------- *** This advisory supersedes CA-95:05 *** The CERT Coordination Center
2006 Jun 30
1
Determining vulnerability to issues described by SAs
Hi, I've been trying for the past few days to come up with a method for checking a FreeBSD system to see if it is vulnerable to an issue described by a FreeBSD security advisory in some automated way, similar to the way portaudit can use VuXML to check for vulnerabilities in ports. Right now, I'm a bit stuck--there seem to be fairly major issues with all the methods I've come up
2007 Jul 27
1
MRTG with 14all.cgi on centos 5
Hi, I have setup MRTG with 14all.cgi cgi script. I downloaded it from below URL. http://my14all.sourceforge.net/14all-1.1.txt and did only below 3 changes to that file. those can be seen in BOLDletters. # if MRTG_lib.pm (from mrtg) is not in the module search path (@INC) # uncomment the following line and change the path appropriatly: #use lib qw(/usr/local/mrtg-2/lib/mrtg2); use lib
2005 Nov 11
0
[PATCH] icecast video preview 2
hem here it is the patch. ;) bye kysucix -------------- next part -------------- Index: conf/icecast.xml.in =================================================================== --- conf/icecast.xml.in (revisione 10365) +++ conf/icecast.xml.in (copia locale) @@ -62,6 +62,7 @@ <port>8001</port> </listen-socket> --> +
2001 Jan 05
3
subject: ssh non-intuitive logging setting. (priority names)
subject: ssh non-intuitive logging setting (priority names). I installed openssh 2.3.0p1 on Solaris 7 for x86 box and sshd worked fine. However, somehow the logging of connection and disconnection to sshd was not recorded as I wished. Time to investigate. On a host where sshd from data-fellows once ran, the log was recorded with auth.info level. After trying to modify sshd_config, I found that
2005 Oct 02
11
Repeated attacks via SSH
Everyone: We're starting to see a rash of password guessing attacks via SSH on all of our exposed BSD servers which are running an SSH daemon. They're coming from multiple addresses, which makes us suspect that they're being carried out by a network of "bots" rather than a single attacker. But wait... there's more. The interesting thing about these attacks is that
2016 Jun 06
0
[PATCH] Config: Rename mp3-metadata-interval to icy-metadata-interval
As proposed in #2272, this renames the mount specific mp3-metadata-interval to icy-metadata-interval to prevent confusion about what it does (setting the icy metadata interval) and to make clear it's not mp3 specific but ICY specific. --- src/cfgfile.c | 21 +++++++++++++++------ 1 file changed, 15 insertions(+), 6 deletions(-) diff --git a/src/cfgfile.c b/src/cfgfile.c index
2015 Mar 22
2
exposed-port option for Icecast behind reverse proxy
Hello, I didn't want to have to choose between Icecast running on port 80 and all my Apache virtual hosts, running also on port 80, on my sole external IP address. I didn't want either to open port 8000 on my firewall because I wanted all users being able to reach Icecast even the ones behind enterprise firewalls. So I managed to run Apache 2.2 listening on port 80 and Icecast 2.3.2
2008 Aug 11
2
debian package from svn / errors and non working debian rules
Hello, I tried to build an debian package from svn. First I checked out trunk and the 2.3.2 branch, which both build this quite "old" package :-) icecast2_1.9+2.0alphasnap2+20030802-1_amd64.deb Then I tried the kh branch, which doesn't build with dpkg-buildpackage: debian/rules:6: debian/cdbs/1/rules/buildinfo.mk: No such file or directory make: *** No rule to make target
2019 Jan 07
0
how to set proxy systemwide (wget and docker)
> Hallo, > what is the right way to set a proxy systemwide using centos 7? > I need this for wget and docker. > My first idea was /etc/environment but allthough the proxy is set wget and > docker don? t connect to their target-systems. I have this in /etc/profile.d/proxy-config.sh: -----%<--------------------------------- PROXYHOST="proxy" PROXYPORT="8080"
2007 Oct 18
0
[PATCH] Use a control socket directory to restrict access
This approach is more complex than I'd like, but it works even on Solaris, which has neither credential passing nor permissions on the socket itself. --- src/control.c | 82 +++++++++++++++++++++++++++++++++++++++----------- src/control_common.h | 1 + src/tincctl.c | 67 +++++++++++++++++++++++++++++++++-------- src/tincd.c | 2 +- 4 files changed, 120
2000 Nov 08
1
socket leakage patch
We have been fighting with intermittent connections here and have noticed that tinc seems to use up its supply of file descriptors. After a whole bunch of Nov 8 03:51:23 tserver tinc.calgary[23909]: Could not set up a meta connection. Nov 8 03:51:23 tserver tinc.calgary[23909]: Still failed to connect to other. Will retry Nov 8 03:51:33 tserver tinc.calgary[23909]: 10.38.9.1:8193: Connection
2004 Aug 06
0
[RFC] RTP support
Hi, A radio is being developped at school, and we wanted to avoid eating too much bandwidth, so we had a look at RTP. I first implemented it in icecast1 and it worked well (although we had to apply a patch to make RTP work with xmms). We are indeed saving a lot of bandwidth. I then adapted it to icecast2, here is the patch. The biggest trouble for now is the configurability. I added 3 global