similar to: rsync security announcement

Displaying 20 results from an estimated 1000 matches similar to: "rsync security announcement"

2014 Jul 11
0
ANNOUNCE: cifs-utils release 6.4 ready for download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Wow, about 6 months since last cifs-utils release. How time flies. With Guenter's fix for the uppercasing of device names last week, it's probably a good time to go ahead make a new one. There's not much activity this cycle so this is mostly bugfixes, though there is a new autoconf option to allow you to configure the PAM installation
2003 Mar 15
0
[SECURITY] Samba 2.2.8 available for download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This release provides an important security fix outlined in the release notes that follow. This is the latest stable release of Samba and the version that all production Samba servers should be running for all current bug-fixes. The source code can be downloaded from : http://download.samba.org/samba/ftp/ in the file samba-2.2.8.tar.gz or
2003 Mar 15
0
[SECURITY] Samba 2.2.8 available for download
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This release provides an important security fix outlined in the release notes that follow. This is the latest stable release of Samba and the version that all production Samba servers should be running for all current bug-fixes. The source code can be downloaded from : http://download.samba.org/samba/ftp/ in the file samba-2.2.8.tar.gz or
2020 Jun 29
0
oVirt 2020 online conference
Sandro Bonazzola <sbonazzo at redhat.com> 09:54 (1 ora fa) a users, oVirt, Ccn: announce, Ccn: board, Ccn: Discussion It is our pleasure to invite you to oVirt 2020 online conference. The conference,organized by oVirt community, will take place online on Monday, September 7th 2020! oVirt 2020 is a free conference for oVirt community project users and contributors coming to a web browser
2007 Sep 14
0
Zaptel ztdummy module causes playback to fail
I'm using asterisk 1.4.11 and Zaptel version 1.4.5.1 with kernel 2.6.22. I have the ztdummy module loaded, which is using zaptel and rtc. When the ztdummy module is loaded, sounds are not heard when using the asterisk "background" command. When the ztdummy module is unloaded, which also removes zaptel and rtc, sounds are heard. I've also tested this under kernel 2.6.21 with the
2007 Sep 16
0
Problem with asterisk 1.4.11 and playing files to meetme conference
I am using asterisk Version: 1:1.4.11~dfsg-1 as found in Debian. I'm using a call file to connect a meetme conference to an AGI script which plays files using the stream_file method. I have four files which should play in sequence, though only the first two files actually play. I get these errors in the CLI: [Sep 16 06:20:43] NOTICE[18424]: app_meetme.c:1911 conf_run: Audio bytes: 276 Buffer
2014 Jun 18
0
[Qemu-devel] Why I advise against using ivshmem
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Am 18.06.2014 12:48, schrieb Stefan Hajnoczi: > On Tue, Jun 17, 2014 at 11:44:11AM +0200, Paolo Bonzini wrote: >> Il 17/06/2014 11:03, David Marchand ha scritto: >>>> Unless someone steps up and maintains ivshmem, I think it >>>> should be deprecated and dropped from QEMU. >>> >>> Then I can maintain
2002 Jul 31
0
FreeBSD Security Advisory FreeBSD-SA-02:32.pppd
-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SA-02:32.pppd Security Advisory The FreeBSD Project Topic: exploitable race condition in pppd Category: core Module: pppd Announced: 2002-07-31 Credits:
2004 Apr 15
0
FreeBSD Security Advisory FreeBSD-SA-04:07.cvs
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-04:07.cvs Security Advisory The FreeBSD Project Topic: CVS path validation errors Category: contrib Module: contrib_cvs Announced:
2004 Apr 15
0
FreeBSD Security Advisory FreeBSD-SA-04:07.cvs
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-04:07.cvs Security Advisory The FreeBSD Project Topic: CVS path validation errors Category: contrib Module: contrib_cvs Announced:
2002 Oct 04
1
Confirming kerberos for upcoming OpenSSH portable release.
O.K. I know it was too late to make changes for the next release, but thankfully there werent any changes needed. Kerberos over ssh protocol 1 worked out of the box from CVS today (2002/10/04-14:30) The krb5 patches we were using (I think from Olaf K) was all in the code. The only thing I had to patch to get things working was removing the scard-install from the Makefile.in The compiled code
2004 Sep 20
0
FreeBSD Security Advisory FreeBSD-SA-04:14.cvs
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-04:14.cvs.asc Security Advisory The FreeBSD Project Topic: CVS Category: contrib Module: cvs Announced: 2004-09-19 Credits: Stefan
2004 Sep 20
0
FreeBSD Security Advisory FreeBSD-SA-04:14.cvs
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-04:14.cvs.asc Security Advisory The FreeBSD Project Topic: CVS Category: contrib Module: cvs Announced: 2004-09-19 Credits: Stefan
2003 Sep 29
2
solaris 9 and compiling
Hello, I have a problem to build the samba_3.0 sources for sol9 , i am running gcc-3.3. It works , but the binaries became huge , the samba.pkg is about 450 MB . Now my question; do i need any compiler flags ? i did it with default-settings. But as i said , it works , i can join domains , hope there is a sun-guru. kind regards martin schreiber Siemens Business Services CCN-ITS
2008 Apr 08
1
Rsync 3.0.2 released w/xattr security fix (attn: 2.6.9 onward)
I have released rsync 3.0.2. This is a security release to fix a potential buffer overflow in the extended attribute support. For more details, see the rsync security advisory page: http://rsync.samba.org/security.html There is a patch there that can be applied to 2.6.9 (if you were using the xattrs.patch), 3.0.0, or 3.0.1. Those running a writable rsync daemon can opt to refuse the
2008 Apr 08
1
Rsync 3.0.2 released w/xattr security fix (attn: 2.6.9 onward)
I have released rsync 3.0.2. This is a security release to fix a potential buffer overflow in the extended attribute support. For more details, see the rsync security advisory page: http://rsync.samba.org/security.html There is a patch there that can be applied to 2.6.9 (if you were using the xattrs.patch), 3.0.0, or 3.0.1. Those running a writable rsync daemon can opt to refuse the
2014 Jun 18
6
[Qemu-devel] Why I advise against using ivshmem
On Tue, Jun 17, 2014 at 11:44:11AM +0200, Paolo Bonzini wrote: > Il 17/06/2014 11:03, David Marchand ha scritto: > >>Unless someone steps up and maintains ivshmem, I think it should be > >>deprecated and dropped from QEMU. > > > >Then I can maintain ivshmem for QEMU. > >If this is ok, I will send a patch for MAINTAINERS file. > > Typically, adding
2014 Jun 18
6
[Qemu-devel] Why I advise against using ivshmem
On Tue, Jun 17, 2014 at 11:44:11AM +0200, Paolo Bonzini wrote: > Il 17/06/2014 11:03, David Marchand ha scritto: > >>Unless someone steps up and maintains ivshmem, I think it should be > >>deprecated and dropped from QEMU. > > > >Then I can maintain ivshmem for QEMU. > >If this is ok, I will send a patch for MAINTAINERS file. > > Typically, adding
2000 Jun 06
0
[CSSA-2000-015-0] Caldera Security Advisory: KDE suid root applications
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ Caldera Systems, Inc. Security Advisory Subject: kdelibs vulnerability for setuid KDE applications Advisory number: CSSA-2000-015.0 Issue date: 2000 June, 02 Cross reference: ______________________________________________________________________________ 1.
2014 Jun 18
1
[Qemu-devel] Why I advise against using ivshmem
Hello Stefan, On 06/18/2014 12:48 PM, Stefan Hajnoczi wrote: > One more thing to add to the list: > > static void ivshmem_read(void *opaque, const uint8_t * buf, int flags) > > The "flags" argument should be "size". Size should be checked before > accessing buf. You are welcome to send a fix and I will review it. > > Please also see the bug fixes in