Displaying 20 results from an estimated 1000 matches similar to: "an anti-overflow wrapper"
2015 Aug 31
0
[PATCH v5 1/2] cat: move get_journal_field to fish/journal.c
---
cat/Makefile.am | 1 +
cat/log.c | 114 +-------------------------------------------
fish/Makefile.am | 1 +
fish/journal.c | 142 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
4 files changed, 145 insertions(+), 113 deletions(-)
create mode 100644 fish/journal.c
diff --git a/cat/Makefile.am b/cat/Makefile.am
index d0db6fa..d472100 100644
--- a/cat/Makefile.am
+++
2015 Aug 27
0
[PATCH v4 1/2] cat: move get_journal_field to fish/journal.c
---
cat/Makefile.am | 1 +
cat/log.c | 113 ++-----------------------------------------
fish/Makefile.am | 1 +
fish/journal.c | 142 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
4 files changed, 147 insertions(+), 110 deletions(-)
create mode 100644 fish/journal.c
diff --git a/cat/Makefile.am b/cat/Makefile.am
index d0db6fa..d472100 100644
--- a/cat/Makefile.am
+++
1998 Apr 28
0
[Debian 2.0] /usr/bin/suidexec gives root access
Executive summary: /usr/bin/suidexec gives every user a
root shell. Remove it.
tlr
----- Forwarded message from Thomas Roessler <roessler@guug.de> -----
Date: Tue, 28 Apr 1998 15:21:17 +0200
From: Thomas Roessler <roessler@guug.de>
Subject: suidmanager: SECURITY BREACH: /usr/bin/suidexec gives root access to every user on the system
To: submit@bugs.debian.org
Package: suidmanager
2015 Mar 03
0
[PATCH v2] fish: add journal-view command
Lets user view journald log from VM in a similar format as journalctl uses.
Makes virt-log use the same code as guestfish for journal-view.
Fixes RFE: journal reader in guestfish (RHBZ#988100)
---
cat/Makefile.am | 1 +
cat/log.c | 112 +-------------------------------
fish/Makefile.am | 1 +
fish/fish.h | 3 +
fish/journal.c | 178
2015 Mar 05
0
[PATCH v3] fish: add journal-view command
Lets user view journald log from VM in a similar format as journalctl uses.
Makes virt-log use the same code as guestfish for journal-view.
Fixes RFE: journal reader in guestfish (RHBZ#988100)
---
cat/Makefile.am | 1 +
cat/log.c | 113 +-------------------------------
fish/Makefile.am | 1 +
fish/fish.h | 3 +
fish/journal.c | 178
1997 Jul 08
3
so-called snprintf() in db-1.85.4
Hi,
There is a severe problem with the db-1.85.4 library''s Linux
port that can be found on sunsite.unc.edu under
/pub/Linux/libs/db-1.85.4-src.tar.gz (sp?): This library
contains a "snprintf" function which breaks down to a common
sprintf, ignoring the size parameter. Obviously, this was
thought to be a terribly bad work-around for C libraries which
don''t contain an
2005 Aug 15
2
recompile sshd with OPIE?
Hi,
I'm having trouble getting an answer to the following problem on -questions
- I hope someone here has done something similar and can help.
I'd like to compile support for FreeBSD OPIE into sshd. Presently I have
to use PAM to achieve one-time password support. On a 4.x system I have
in /etc/ssh/sshd_config
ChallengeResponseAuthentication yes
and in /etc/pam.conf
sshd auth
1996 Sep 18
1
CERT Advisory CA-96.20 - Sendmail Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-96.20
Original issue date: September 18, 1996
Last revised: --
Topic: Sendmail Vulnerabilities
- -----------------------------------------------------------------------------
*** This advisory supersedes CA-95:05 ***
The CERT Coordination Center
2006 Jun 30
1
Determining vulnerability to issues described by SAs
Hi,
I've been trying for the past few days to come up with a method for
checking a FreeBSD system to see if it is vulnerable to an issue
described by a FreeBSD security advisory in some automated way, similar
to the way portaudit can use VuXML to check for vulnerabilities in
ports. Right now, I'm a bit stuck--there seem to be fairly major issues
with all the methods I've come up
2007 Jul 27
1
MRTG with 14all.cgi on centos 5
Hi,
I have setup MRTG with 14all.cgi cgi script.
I downloaded it from below URL.
http://my14all.sourceforge.net/14all-1.1.txt
and did only below 3 changes to that file. those can be seen in BOLDletters.
# if MRTG_lib.pm (from mrtg) is not in the module search path (@INC)
# uncomment the following line and change the path appropriatly:
#use lib qw(/usr/local/mrtg-2/lib/mrtg2);
use lib
2005 Nov 11
0
[PATCH] icecast video preview 2
hem here it is the patch. ;)
bye
kysucix
-------------- next part --------------
Index: conf/icecast.xml.in
===================================================================
--- conf/icecast.xml.in (revisione 10365)
+++ conf/icecast.xml.in (copia locale)
@@ -62,6 +62,7 @@
<port>8001</port>
</listen-socket>
-->
+
2001 Jan 05
3
subject: ssh non-intuitive logging setting. (priority names)
subject: ssh non-intuitive logging setting (priority names).
I installed openssh 2.3.0p1 on Solaris 7 for x86 box and
sshd worked fine.
However, somehow the logging of connection and disconnection to
sshd was not recorded as I wished.
Time to investigate.
On a host where sshd from data-fellows once ran,
the log was recorded with auth.info level.
After trying to modify sshd_config, I found
that
2005 Oct 02
11
Repeated attacks via SSH
Everyone:
We're starting to see a rash of password guessing attacks via SSH
on all of our exposed BSD servers which are running an SSH daemon.
They're coming from multiple addresses, which makes us suspect that
they're being carried out by a network of "bots" rather than a single attacker.
But wait... there's more. The interesting thing about these attacks
is that
2016 Jun 06
0
[PATCH] Config: Rename mp3-metadata-interval to icy-metadata-interval
As proposed in #2272, this renames the mount specific
mp3-metadata-interval to icy-metadata-interval to prevent
confusion about what it does (setting the icy metadata
interval) and to make clear it's not mp3 specific but ICY
specific.
---
src/cfgfile.c | 21 +++++++++++++++------
1 file changed, 15 insertions(+), 6 deletions(-)
diff --git a/src/cfgfile.c b/src/cfgfile.c
index
2015 Mar 22
2
exposed-port option for Icecast behind reverse proxy
Hello,
I didn't want to have to choose between Icecast running on port 80 and all
my Apache virtual hosts, running also on port 80, on my sole external IP
address.
I didn't want either to open port 8000 on my firewall because I wanted all
users being able to reach Icecast even the ones behind enterprise firewalls.
So I managed to run Apache 2.2 listening on port 80 and Icecast 2.3.2
2008 Aug 11
2
debian package from svn / errors and non working debian rules
Hello,
I tried to build an debian package from svn. First I checked out trunk
and the 2.3.2 branch, which both build this quite "old" package :-)
icecast2_1.9+2.0alphasnap2+20030802-1_amd64.deb
Then I tried the kh branch, which doesn't build with dpkg-buildpackage:
debian/rules:6: debian/cdbs/1/rules/buildinfo.mk: No such file or directory
make: *** No rule to make target
2019 Jan 07
0
how to set proxy systemwide (wget and docker)
> Hallo,
> what is the right way to set a proxy systemwide using centos 7?
> I need this for wget and docker.
> My first idea was /etc/environment but allthough the proxy is set wget and
> docker don? t connect to their target-systems.
I have this in /etc/profile.d/proxy-config.sh:
-----%<---------------------------------
PROXYHOST="proxy"
PROXYPORT="8080"
2007 Oct 18
0
[PATCH] Use a control socket directory to restrict access
This approach is more complex than I'd like, but it works even on Solaris,
which has neither credential passing nor permissions on the socket itself.
---
src/control.c | 82 +++++++++++++++++++++++++++++++++++++++-----------
src/control_common.h | 1 +
src/tincctl.c | 67 +++++++++++++++++++++++++++++++++--------
src/tincd.c | 2 +-
4 files changed, 120
2000 Nov 08
1
socket leakage patch
We have been fighting with intermittent connections here and have noticed that
tinc seems to use up its supply of file descriptors.
After a whole bunch of
Nov 8 03:51:23 tserver tinc.calgary[23909]: Could not set up a meta connection.
Nov 8 03:51:23 tserver tinc.calgary[23909]: Still failed to connect to other. Will retry
Nov 8 03:51:33 tserver tinc.calgary[23909]: 10.38.9.1:8193: Connection
2004 Aug 06
0
[RFC] RTP support
Hi,
A radio is being developped at school, and we wanted to avoid eating
too much bandwidth, so we had a look at RTP. I first implemented it
in icecast1 and it worked well (although we had to apply a patch to make
RTP work with xmms). We are indeed saving a lot of bandwidth. I then
adapted it to icecast2, here is the patch. The biggest trouble for
now is the configurability. I added 3 global