similar to: xterm

Displaying 20 results from an estimated 2000 matches similar to: "xterm"

1996 Dec 07
0
Old sendmail advisory
> ========================================================================== > CERT(sm) Advisory CA-96.20 > Original issue date: September 18, 1996 > Last revised: -- > > Topic: Sendmail Vulnerabilities > -------------------------------------------------------------------------- > *** This advisory supersedes CA-95:05 *** Just a word of warning -
1997 Sep 26
1
tty chowning
About a year ago I outlined a scheme for arranging chowning of the tty end of ptys without needing root privileges. Since then, I haven''t had time to actually implement it. I was thinking about the problem again today, and, having learned a bit about sessions and controlling ttys and stuff, was able to come up with a simpler mechanism. First, observe that the POSIX session mechanism, if
1997 Sep 22
1
rwhod is naive
It seems that when you send rwhod an rwho packet, it blindly assumes you are who the packet says you are. That is to say, it looks as if any host can inject false rwho data for any other host. I''m not convinced this is worth fixing. Opinions? -- - David A. Holland | VINO project home page: dholland@eecs.harvard.edu | http://www.eecs.harvard.edu/vino
1997 Jan 18
0
write(1) leak
Some versions (the util-linux version, but not the netwrite or netkit versions) of /usr/bin/write have a buffer overrun problem that is almost certainly exploitable. Note that this gives access to the tty group, but not (directly) root. The fix is to change the two sprintfs to snprintfs. Patches have been mailed to the maintainer. -- - David A. Holland | VINO project home page:
1997 Jan 02
2
Re: libc bugs (was Re: Distributions...)
Marek Michalkiewicz <marekm@I17LINUXB.ISTS.PWR.WROC.PL> wrote: : It seems that most of the RedHat 5.3.12 security patches are in the : standard 5.4.17, except for the patch below. Also, there are more : (different) fixes in 5.4.18 (check h_length against sizeof(sin_addr) : in inet/rcmd.c and inet/rexec.c). : + { : +
1997 Jan 12
9
dos-attack on inetd.
Hi. I don''t know if this one is known, but I can''t recall seeing anything about it. If it is old news I apologize. I discovered a bug in the inetd that comes with NetKit-B-0-08 and older. If a single SYN is sent to port 13 of the server, inetd will die of Broken Pipe: write(3, "Sun Jan 12 21:50:35 1997\r\n", 26) = -1 EPIPE (Broken pipe) --- SIGPIPE (Broken pipe) ---
1997 Sep 27
0
x-kernel@vger.rutgers.edu Subject: Re: tty chowning Newsgroups: mail.linux.kernel In-Reply-To: <199709261901.PAA04763@dcl.MIT.EDU> Organization: Cc: Bcc: "Theodore Y. Ts''o" <tytso@MIT.EDU> writes: > David Holland <dholland@eecs.harvard.edu> writes: > } Why not build chowning into this process? On TIOCSCTTY, the tty would > } chown itself to the
1997 Oct 22
1
SNI-20: Telnetd tgetent vulnerability
[mod: Executive summary: SNI found recent linux-distributions not-vulnerable -- REW] -----BEGIN PGP SIGNED MESSAGE----- ###### ## ## ###### ## ### ## ## ###### ## # ## ## ## ## ### ## ###### . ## ## . ######.
1997 Apr 24
1
/dev/random and MAKEDEV-C-1.6
[Note: this has already been sent to comp.os.linux.announce.] -----BEGIN PGP SIGNED MESSAGE----- It has come to my attention that the recent 1.6 release of MAKEDEV-C inadvertently created /dev/random and /dev/urandom with the wrong permissions. /dev/random and /dev/urandom should look like this: crw-r--r-- 1 root system 1, 8 Feb 21 14:42 /dev/random crw-r--r-- 1 root system
2015 Apr 21
0
CentOS 7 and vino
I am trying to get vino going on CentOS 7.1 I run this command: gsettings set org.gnome.Vino require-encryption false Then this one: gsettings list-recursively org.gnome.Vino org.gnome.Vino notify-on-connect true org.gnome.Vino alternative-port uint16 5900 org.gnome.Vino disable-background false org.gnome.Vino use-alternative-port false org.gnome.Vino icon-visibility 'client'
1997 Sep 16
8
Re: Security Concern..
[Mod: This message is a reason *why* linux-security is moderated list. This is also a reason why Rogier, myself, Alan Cox and others really do not want to have completely open lists that deal with security related aspects of running a system as way too many people just jump to conclusions and give suggestions without doing any reasearch on a subject. -- alex (co-moderator of
1997 Jan 20
0
Re: write(1) security problem
> Some versions (the util-linux version, but not the netwrite or netkit > versions) of /usr/bin/write have a buffer overrun problem that is > almost certainly exploitable. Note that this gives access to the tty > group, but not (directly) root. > > The fix is to change the two sprintfs to snprintfs. Patches have been > mailed to the maintainer. While I agree that routines
2013 Jan 22
0
CentOS-announce Digest, Vol 95, Issue 6
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2013 Oct 23
0
CESA-2013:1452 Moderate CentOS 5 vino Update
CentOS Errata and Security Advisory 2013:1452 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1452.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 6f9e41d0b9e7dc36736a76d4e13e637faade333740eb51478580177461b631f7 vino-2.13.5-10.el5_10.i386.rpm x86_64:
2013 Oct 23
0
CESA-2013:1452 Moderate CentOS 6 vino Update
CentOS Errata and Security Advisory 2013:1452 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1452.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: ba60630e41e8c8341218d49294c94402ad59e251f1e4ef5b458aa2da7fc160cc vino-2.28.1-9.el6_4.i686.rpm x86_64:
2007 Jan 14
0
Re: [CentOS-devel] logged in sessions - was CentOS 5 ArtWork
On Sun, 2007-01-14 at 18:38 +0000, Jason_Meers wrote: > Christoph Maser wrote: > > >> > > Actually the default logins (text mode and gdm) both show the hostname. > > Don't tell me you leave logged in sessions. > > > > No not normally, only on a few specific machines on the LAN that are > only accessible from another machine on the LAN. > >
2013 Oct 23
0
CentOS-announce Digest, Vol 104, Issue 10
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2013 Oct 24
0
CentOS-announce Digest, Vol 104, Issue 11
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
1997 Jan 31
10
Linux virus
ugh :) Today I became infected with the bliss virus, any info on this would be appreciated! How do I scan for files infected and is it possible to remove it? I first noticed the infection when running a program (not as root) messages flashed on the screen about transversing directories and such. The program (gimp) had been working fine since I downloaded the binary for gimp from their main
2015 Oct 08
2
vino-server on Centos 6.7
Hi, The vino-server take too much cpu and memory, how to fix it? Cheers, M.