similar to: LSF Update#14: Vulnerability of the lpr program.

Displaying 20 results from an estimated 6000 matches similar to: "LSF Update#14: Vulnerability of the lpr program."

1996 Nov 25
0
LSF Update#14 v1.2 "lpr vulnerability"
-----BEGIN PGP SIGNED MESSAGE----- $Id: lpr-vulnerability-0.6-linux,v 1.2 1996/11/25 22:39:20 alex Exp $ Linux Security FAQ Update lpr Vulnerability Mon Nov 25 16:56:59 EST 1996 Copyright (C) 1995,1996 Alexander O. Yuriev (alex@bach.cis.temple.edu) CIS Laboratories
1996 Nov 21
2
Re: BOUNCE: Re: Chattr +i and securelevel
Alexander O. Yuriev wrote: > > Your message dated: Wed, 20 Nov 1996 18:04:39 EST > > >has anyone played with the securelevel variable in the kernel and the > > >immutable flags in the ext2 file system? > > > > Yes, and its actualy quite nice. > > > > >The sysctrl code seems to allow the setting of the flag > > >only by init (PID=1)
1997 Feb 24
0
ADMIN: Change of address
-----BEGIN PGP SIGNED MESSAGE----- As I am sure you noticed from my messages to linux-{security|alert}, I have changed my primary email address from alex@bach.cis.temple.edu to alex@yuriev.com. Linux Security WWW will be moved from bach.cis.temple.edu in the nearest future and while I will continue to mirror pages to make them accessible at http://bach.cis.temple.edu/linux/linux-security/, please
1996 Nov 18
0
New moderator, linux-alert lists'' consolidation.
-----BEGIN PGP SIGNED MESSAGE----- The linux-alert-digest list has now been consolidated with the linux-alert list. There wasn''t nearly enough traffic on the linux-alert list to justify its having a separate digest list; subscribers to linux-alert-digest tended to receive the same number of e-mail messages as subscribers to linux-alert, only with an additional time lag of up to a
1996 Nov 14
1
Security hole in Debian 1.1 dosemu package
In Debian 1.1, the optional DOSEMU package installs /usr/sbin/dos setuid root. This is a serious security hole which can be exploited to gain access to any file on the system. Package: dosemu Version: 0.64.0.2-9 ------- start of cut text -------------- $ cat /etc/debian_version 1.1 $ id uid=xxxx(quinlan) gid=xxxx(quinlan) groups=xxxx(quinlan),20(dialout),24(cdrom) [quinlan:~]$ ls -al
2013 Jan 18
0
[Lsf-pc] [CFP] Linux Storage, Filesystem and Memory Management Summit 2013
The annual Linux Storage, Filesystem and Memory Management Summit for 2013 will be held on April 18th and 19th following the Linux Foundation Collaboration Summit at Parc 55 Hotel in San Francisco, CA: https://events.linuxfoundation.org/events/collaboration-summit https://events.linuxfoundation.org/events/lsfmm-summit We''d therefore like to issue a call for agenda proposals that are
2010 Oct 01
1
Pass Arguments to R with an LSF submit
I'm trying to run R in batch mode on an LSF managed cluster. In simple settings, I can do it just fine. The trouble I'm having is when I try to pass arguments to the batch job. For example, bsub R CMD BATCH --args 1 3 commandfile.R & LSF doesn't like the &, and it doesn't run. I'm hoping one you can help me submit a job to an LSF cluster that allows me to pass
2001 Aug 13
0
Security Update: [CSSA-2001-30.0] Linux - Telnet AYT remote exploit
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ Caldera International, Inc. Security Advisory Subject: Linux - Telnet AYT remote exploit Advisory number: CSSA-2001-030.0 Issue date: 2001, August 10 Cross reference: ______________________________________________________________________________ 1. Problem
2005 May 19
1
Re: pronunciation? -- loving CentOS doesn't mean you have to bash Red Hat
From: Martyn Drake <martyn at drake.org.uk> > To be quite honest with you - that's been and gone so quickly I can't > ever remember what my position was at that time. It actually happened over the span of 2 years before any name change. With the introduction of RHEL as a separate product, RHL was having an identity crisis. It used to be that ".2" was the
2013 Nov 10
1
Embedded R Fails When Run on LSF Queue System
Hi, I had a quick question I was hoping someone might be able to answer, as my journey through the source code so far has not been very profitable. I have a command line program that embeds R, and the program works just fine when run from the command line. However, when I run the program as a job in the LSF cluster at my institute, the following error occurs: Fatal error: you must specify
1997 Mar 07
0
Linux Security WWW has moved
-----BEGIN PGP SIGNED MESSAGE----- Hi, The new externally accessible URL for Linux Security WWW is http://www.aoy.net/Linux/Security/. Please update your pointers. Bach.cis.temple.edu/linux/linux-security/ will have a pointer to a new site. Red Hat''s mirror (http://www.redhat.com/linux-info/security/) should be pointing to a new address in a couple of days. -----BEGIN PGP
2005 May 23
0
Re: Hi, Bryan; was: Re: pronunciation? <snip> --
From: Feizhou <feizhou at graffiti.net> > I still remember the FIRST Linux GUI installer for a Linux distro. It > came on the Caldera Openlinux 2.2. It worked. It was really nice. Actually, the first distro with a GUI installer was Yggdrasil, circa 1993. It installed on 8MB of RAM using X and Athena/FVWM. > The Novell guys that were behind Caldera deserve plenty of respect for
2014 Oct 31
0
Samba4 PDC keytab creation for NFSv4 not working
Hello everybody, Fist a little about our setup. We have an Debian (7) Wheezy, now upgraded to Debian (testing) Jessie with Samba4 as PDC, Kerberos and LDAP - all provided through Samba4, and bind9 and isc-dhcp server for DDNS and DHCP, our environment is a mix of Linux (Debian Jessie), Mac (Maverick and Yosemite) and Windows 7 and 8.1 clients. The Windows clients use Samba and are all part of
1996 Dec 23
2
Buffer overflow in Linux''s login program [Forwarded e-mail from Joe Zbiciak]
------- start of forwarded message (RFC 934 encapsulation) ------- From: Joe Zbiciak <im14u2c@cegt201.bradley.edu> Approved: alex@bach.cis.temple.edu Sender: Bugtraq List <BUGTRAQ@netspace.org> To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org> Subject: Buffer overflow in Linux''s login program Date: Sun, 22 Dec 1996 09:27:24 -0600 Reply-To: Joe Zbiciak
1997 Jul 17
0
KSR[T] Advisory #2: ld.so
KSR[T] Advisory #002 Date: Jul 16, 1997 ID #: lin-ldso-002 Operating System(s): Linux Affected Program: ld.so / ld-linux.so Problem Description: ld.so is the run-time linker used by dynamically linked executables(a.out). Inside the error reporting
1997 Sep 18
0
[MOD] About "Security concern"
[Mod: Warning - we are hitting issues of security policy and that is not what we would like to see here --alex] Brian Koref said: > > Great input... > > As an investigator, many of the compromises I see involve systems > which are 2 to 3 years old. An old slackware box sitting on a .mil > domain, which some airman set up as a test machine. The airman gets > trasferred, and
2005 Jul 06
5
NUT 2.x causes uhci-usb error messages in syslog.
Hello, For a while I have been running NUT 2.0.0 just fine with my APC Back-UPS RS 800 using the usbhid interface. I decided to upgrade to 2.0.2, and all went well (upsc and upsd/upsmon seem happy to talk to the UPS), but I am getting a ton of these messages in my syslog: Jul 6 17:12:45 yggdrasil kernel: usb-uhci.c: interrupt, status 3, frame# 780 Jul 6 17:12:50 yggdrasil kernel:
2016 Aug 01
0
NT domain login no longer works after distro upgrade (samba 4.2.12 -> 4.3.11, 4.4.5)
Workstation  is member of NT domain, DC is samba 3.6.12. Was running Fedora 22 (samba 4.2.12), domain logins were working fine. Upgraded to Fedora 23 (samba 4.3.11) and domain logins no longer work: "Domain Controller unreachable, using cached credentials instead." Can connect to shares on the DC (e.g., with smbclient) without problem. Upgraded to samba 4.4.5 (from Fedora 24), issue
2000 May 19
0
Re: [Security - intern] Re: ssh and chroot...
Good call - I forgot to mention that. Caldera released an advisory a couple months ago about it if anyone's interested: ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-008.0.txt Dave -----Original Message----- From: Thomas Biege [mailto:thomas@suse.de] Sent: Friday, May 19, 2000 2:44 AM To: David LaPorte Cc: Mike Bowie; linux-security@redhat.com Subject: Re: [Security -
2001 Sep 10
0
Security Update [CSSA-033.0]Linux - uucp argument handling problems
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ Caldera International, Inc. Security Advisory Subject: Linux - uucp argument handling problems Advisory number: CSSA-2001-033.0 Issue date: 2001, September 07 Cross reference: ______________________________________________________________________________ 1.