Displaying 20 results from an estimated 1000 matches similar to: "rsync security announcement"
2014 Jul 11
0
ANNOUNCE: cifs-utils release 6.4 ready for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Wow, about 6 months since last cifs-utils release. How time flies. With
Guenter's fix for the uppercasing of device names last week, it's
probably a good time to go ahead make a new one.
There's not much activity this cycle so this is mostly bugfixes, though
there is a new autoconf option to allow you to configure the PAM
installation
2003 Mar 15
0
[SECURITY] Samba 2.2.8 available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This release provides an important security fix outlined in the
release notes that follow. This is the latest stable release of
Samba and the version that all production Samba servers should be
running for all current bug-fixes.
The source code can be downloaded from :
http://download.samba.org/samba/ftp/
in the file samba-2.2.8.tar.gz or
2003 Mar 15
0
[SECURITY] Samba 2.2.8 available for download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This release provides an important security fix outlined in the
release notes that follow. This is the latest stable release of
Samba and the version that all production Samba servers should be
running for all current bug-fixes.
The source code can be downloaded from :
http://download.samba.org/samba/ftp/
in the file samba-2.2.8.tar.gz or
2020 Jun 29
0
oVirt 2020 online conference
Sandro Bonazzola <sbonazzo at redhat.com>
09:54 (1 ora fa)
a users, oVirt, Ccn: announce, Ccn: board, Ccn: Discussion
It is our pleasure to invite you to oVirt 2020 online conference. The
conference,organized by oVirt community, will take place online on Monday,
September 7th 2020!
oVirt 2020 is a free conference for oVirt community project users and
contributors coming to a web browser
2007 Sep 14
0
Zaptel ztdummy module causes playback to fail
I'm using asterisk 1.4.11 and Zaptel version 1.4.5.1 with kernel
2.6.22. I have the ztdummy module loaded, which is using zaptel and rtc.
When the ztdummy module is loaded, sounds are not heard when using the
asterisk "background" command. When the ztdummy module is unloaded,
which also removes zaptel and rtc, sounds are heard.
I've also tested this under kernel 2.6.21 with the
2007 Sep 16
0
Problem with asterisk 1.4.11 and playing files to meetme conference
I am using asterisk Version: 1:1.4.11~dfsg-1 as found in Debian. I'm
using a call file to connect a meetme conference to an AGI script which
plays files using the stream_file method. I have four files which should
play in sequence, though only the first two files actually play. I get
these errors in the CLI:
[Sep 16 06:20:43] NOTICE[18424]: app_meetme.c:1911 conf_run: Audio
bytes: 276 Buffer
2014 Jun 18
0
[Qemu-devel] Why I advise against using ivshmem
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Am 18.06.2014 12:48, schrieb Stefan Hajnoczi:
> On Tue, Jun 17, 2014 at 11:44:11AM +0200, Paolo Bonzini wrote:
>> Il 17/06/2014 11:03, David Marchand ha scritto:
>>>> Unless someone steps up and maintains ivshmem, I think it
>>>> should be deprecated and dropped from QEMU.
>>>
>>> Then I can maintain
2002 Jul 31
0
FreeBSD Security Advisory FreeBSD-SA-02:32.pppd
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-02:32.pppd Security Advisory
The FreeBSD Project
Topic: exploitable race condition in pppd
Category: core
Module: pppd
Announced: 2002-07-31
Credits:
2004 Apr 15
0
FreeBSD Security Advisory FreeBSD-SA-04:07.cvs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:07.cvs Security Advisory
The FreeBSD Project
Topic: CVS path validation errors
Category: contrib
Module: contrib_cvs
Announced:
2004 Apr 15
0
FreeBSD Security Advisory FreeBSD-SA-04:07.cvs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:07.cvs Security Advisory
The FreeBSD Project
Topic: CVS path validation errors
Category: contrib
Module: contrib_cvs
Announced:
2002 Oct 04
1
Confirming kerberos for upcoming OpenSSH portable release.
O.K. I know it was too late to make changes for the next release, but
thankfully there werent any changes needed. Kerberos over ssh protocol 1
worked out of the box from CVS today (2002/10/04-14:30)
The krb5 patches we were using (I think from Olaf K) was all in the
code. The only thing I had to patch to get things working was removing
the scard-install from the Makefile.in
The compiled code
2004 Sep 20
0
FreeBSD Security Advisory FreeBSD-SA-04:14.cvs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:14.cvs.asc Security Advisory
The FreeBSD Project
Topic: CVS
Category: contrib
Module: cvs
Announced: 2004-09-19
Credits: Stefan
2004 Sep 20
0
FreeBSD Security Advisory FreeBSD-SA-04:14.cvs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:14.cvs.asc Security Advisory
The FreeBSD Project
Topic: CVS
Category: contrib
Module: cvs
Announced: 2004-09-19
Credits: Stefan
2003 Sep 29
2
solaris 9 and compiling
Hello,
I have a problem to build the samba_3.0 sources for sol9 , i am running
gcc-3.3. It works , but the binaries became huge , the samba.pkg is about
450 MB . Now my question; do i need any compiler flags ? i did it with
default-settings.
But as i said , it works , i can join domains , hope there is a sun-guru.
kind regards martin schreiber
Siemens Business Services
CCN-ITS
2008 Apr 08
1
Rsync 3.0.2 released w/xattr security fix (attn: 2.6.9 onward)
I have released rsync 3.0.2. This is a security release to fix a
potential buffer overflow in the extended attribute support. For
more details, see the rsync security advisory page:
http://rsync.samba.org/security.html
There is a patch there that can be applied to 2.6.9 (if you were using
the xattrs.patch), 3.0.0, or 3.0.1.
Those running a writable rsync daemon can opt to refuse the
2008 Apr 08
1
Rsync 3.0.2 released w/xattr security fix (attn: 2.6.9 onward)
I have released rsync 3.0.2. This is a security release to fix a
potential buffer overflow in the extended attribute support. For
more details, see the rsync security advisory page:
http://rsync.samba.org/security.html
There is a patch there that can be applied to 2.6.9 (if you were using
the xattrs.patch), 3.0.0, or 3.0.1.
Those running a writable rsync daemon can opt to refuse the
2014 Jun 18
6
[Qemu-devel] Why I advise against using ivshmem
On Tue, Jun 17, 2014 at 11:44:11AM +0200, Paolo Bonzini wrote:
> Il 17/06/2014 11:03, David Marchand ha scritto:
> >>Unless someone steps up and maintains ivshmem, I think it should be
> >>deprecated and dropped from QEMU.
> >
> >Then I can maintain ivshmem for QEMU.
> >If this is ok, I will send a patch for MAINTAINERS file.
>
> Typically, adding
2014 Jun 18
6
[Qemu-devel] Why I advise against using ivshmem
On Tue, Jun 17, 2014 at 11:44:11AM +0200, Paolo Bonzini wrote:
> Il 17/06/2014 11:03, David Marchand ha scritto:
> >>Unless someone steps up and maintains ivshmem, I think it should be
> >>deprecated and dropped from QEMU.
> >
> >Then I can maintain ivshmem for QEMU.
> >If this is ok, I will send a patch for MAINTAINERS file.
>
> Typically, adding
2000 Jun 06
0
[CSSA-2000-015-0] Caldera Security Advisory: KDE suid root applications
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: kdelibs vulnerability for setuid KDE applications
Advisory number: CSSA-2000-015.0
Issue date: 2000 June, 02
Cross reference:
______________________________________________________________________________
1.
2014 Jun 18
1
[Qemu-devel] Why I advise against using ivshmem
Hello Stefan,
On 06/18/2014 12:48 PM, Stefan Hajnoczi wrote:
> One more thing to add to the list:
>
> static void ivshmem_read(void *opaque, const uint8_t * buf, int flags)
>
> The "flags" argument should be "size". Size should be checked before
> accessing buf.
You are welcome to send a fix and I will review it.
>
> Please also see the bug fixes in