乐投letou,巨弘彩

Filter: 乐彩网购彩平台 - OpenPKG (Cancel)

http://www.zlgchina.com/module/newswire/viewby.php?filter=13
乐投letou,巨弘彩,亿发官方彩票,乐彩网购彩平台印章心胸怕事

Search within this group:
-

  48 entries found:

( 1 2 ... 3 ) Next »

Where Are NoSQL Database Partner Programs?

You know the general trend: NoSQL databases are catching on for big data applications. The challenge: Where are the NoSQL partner programs? A quick check of the market finds very few in place.

2007 Open Source CMS Award Launched with $20,000 Prize Fund

2007 Open Source CMS Award Launched with $20,000 Prize Fund

GNU/Linux -- Like No Other Hotrod, Ever

Tux with cboy's rat-on-a-shoestring LXer Feature: 04-Aug-2006

GNU/Linux -- Like No Other Hotrod, Ever

While others appear to be going backwards, Linux just keeps racing ahead.

'Linux supports more devices, "out of the box", than any other operating system ever has.'

"Yes, that's right, we support more things than anyone else. And more than anyone else ever has in the past. Linux has a very long list of things that we have supported before anyone else ever did."
-- Greg Kroah-Hartman, OLS 2006 Keynote

Google Pack Scores A Near-Miss... No Linux!

The world swooned at the Consumer Electronics Show unveiling of Google Pack, an easily installed almost-all-in-one Internet experience. Too bad it suffers from the same maladies as the rest of the One Size Fits All packages:

Cross-platform packaging facility OpenPKG 2.5 available

The OpenPKG project released version 2.5 of their unique RPM-based cross-platform multi-instance Unix software packaging facility.

Cross-platform packaging facility OpenPKG 2.4 available

The OpenPKG project released version 2.4 of their unique RPM-based cross-platform multi-instance Unix software packaging facility. OpenPKG 2.4 consists of 562 selected (from a pool of over 880) packages.

Cross-platform packaging facility OpenPKG 2.3 released

The OpenPKG project released version 2.3 of their unique RPM-based cross-platform multi-instance Unix software packaging facility. OpenPKG 2.3 consists of 545 selected (from a pool of over 850) packages.

Cross-platform packaging facility OpenPKG 2.2 released

  • The OpenPKG Project; By Ralf S. Engelschall (Posted by VISITOR on Oct 20, 2004 3:42 AM EDT)
  • Story Type: Press Release; Groups: OpenPKG
The OpenPKG project releases version 2.2 of the unique cross-platform software packaging facility.

OpenPKG update for zlib (OpenPKG-SA-2004.038)

OpenPKG update for rsync (OpenPKG-SA-2004.037)

OpenPKG update for cvstrac (OpenPKG-SA-2004.036)

OpenPKG update for png (OpenPKG-SA-2004.035)

OpenPKG update for samba (OpenPKG-SA-2004.033)

Cross-platform packaging facility OpenPKG 2.1 released

The OpenPKG project released version 2.1 of their unique RPM-based cross-platform Unix software packaging facility. OpenPKG 2.1 consists of 495 selected (from a pool of 770) packages which include latest versions of popular Unix software like Apache, Bash, BIND, GCC, INN, Mozilla, MySQL, OpenSSH, Perl, Postfix, PostgreSQL, Samba, Squid, teTeX and Vim -- all carefully packaged for easy deployment on 21 different Unix platforms, including FreeBSD 4.10/5.2, Debian GNU/Linux 3.0/3.1, Red Hat Linux 9, Red Hat Enterprise Linux 3, Fedora Core 2, SuSE Linux 9.0/9.1, and Sun Solaris 2.6/8/9/10. The major technical efforts for this release were spent on the porting of all packages to five additional Unix platforms, the necessary adjustments to packages required by GCC 3.4 and the consolidation and packaging of the developer tool chain.

OpenPKG update for dhcpd (OpenPKG-SA-2004.031)

OpenPKG update for png (OpenPKG-SA-2004.030)

OpenPKG update for cvs (OpenPKG-SA-2004.027)

OpenPKG update for subversion (OpenPKG-SA-2004.028)

OpenPKG update for apache (OpenPKG-SA-2004.029)

OpenPKG update for apache2 (OpenPKG-SA-2004.026)

OpenPKG update for rsync (OpenPKG-SA-2004.025)

OpenPKG update for cvs (OpenPKG-SA-2004.022)

OpenPKG update for apache (OpenPKG-SA-2004.021)

OpenPKG update for ssmtp (OpenPKG-SA-2004.020)

OpenPKG update for kolab (OpenPKG-SA-2004.019)

OpenPKG update for proftpd (OpenPKG-SA-2004.018)

OpenPKG update for png (OpenPKG-SA-2004.017)

OpenPKG update for ethereal (OpenPKG-SA-2004.015)

OpenPKG update for neon (OpenPKG-SA-2004.016)

OpenPKG Alert: OpenPKG Security Advisory (neon)

  • Mailing list; By OpenPKG <openpkg@openpkg.org> (Posted by dave on Apr 16, 2004 8:53 AM EDT)
  • Story Type: Security; Groups: OpenPKG
Greuff of VOID.AT discovered various format string vulnerabilities in the error output handling routines of the Neon HTTP and WebDAV client library. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2004-0179 to the problem.

OpenPKG Alert: OpenPKG Security Advisory (ethereal)

  • Mailing list; By OpenPKG <openpkg@openpkg.org> (Posted by dave on Apr 16, 2004 8:36 AM EDT)
  • Story Type: Security; Groups: OpenPKG
According to a vendor security advisory based on hints from Stefan Esser and Jonathan Heussser, several vulnerabilities of various types exist in the Ethereal network protocol analyzer. Namely, it may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet onto the wire, by convincing someone to read a malformed packet trace file, or by creating a malformed color filter file.

OpenPKG Alert: OpenPKG Security Advisory (mysql)

  • Mailing list; By OpenPKG <openpkg@openpkg.org> (Posted by dave on Apr 14, 2004 1:34 PM EDT)
  • Story Type: Security; Groups: OpenPKG
Shaun Colley discovered [1] that the scripts "mysqlbug" and "mysqld_multi" of the MySQL RDBMS [0] perform insecure creations of temporary files. An attacker could create symbolic links in /tmp to achieve the overwriting of files with the privileges of the user invoking the scripts. The RDBMS startup wrapper "mysqld_multi" is currently not used in OpenPKG, although it is contained in the "mysql" package. The "mysqlbug" script could be run manually by the administrator. The Common Vulnerabilities and Exposures (CVE) project assigned the ids CAN-2004-0381 [2] and CAN-2004-0388 [3] to the problem.

OpenPKG Alert: OpenPKG Security Advisory (cvs)

  • Mailing list; By OpenPKG <openpkg@openpkg.org> (Posted by dave on Apr 14, 2004 10:54 AM EDT)
  • Story Type: Security; Groups: OpenPKG
Sebastian Krahmer from the SuSE Security Team discovered [1] a flaw in Concurrent Versions System (CVS) [0] clients where RCS "diff files" can create files with absolute pathnames. An attacker could create a fake malicious CVS server that would cause arbitrary files to be created or overwritten when a victim connects to it. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2004-0180 [2] to the problem.

OpenPKG Alert: OpenPKG Security Advisory (fetchmail)

  • Mailing list; By OpenPKG <openpkg@openpkg.org> (Posted by dave on Apr 8, 2004 7:48 AM EDT)
  • Story Type: Security; Groups: OpenPKG
According to a Mandrake Linux security advisory [0], a denial of service (DoS) vulnerability exists in the header rewriting code of Fetchmail [1]. The code's intention is to hack message headers so replies work properly. However, logic in the reply_hack() function fails to allocate enough memory for long lines and may write past a memory boundary. This could allow an attacker to cause a denial of service by sending a specially crafted email and crashing fetchmail. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2003-0792 [2] to the problem.

OpenPKG Alert: OpenPKG Security Advisory (sharutils)

  • Mailing list; By OpenPKG <openpkg@openpkg.org> (Posted by dave on Apr 7, 2004 1:28 PM EDT)
  • Story Type: Security; Groups: OpenPKG
According to a posting on Bugtraq [1], Shaun Colley discovered and researched a stack-based buffer overflow vulnerability which exists in the GNU Sharutils [2] due to lack of bounds checking when handling the '-o' command-line option.

OpenPKG Alert: OpenPKG Security Advisory (tcpdump)

  • Mailing list; By OpenPKG <openpkg@openpkg.org> (Posted by dave on Apr 7, 2004 1:28 PM EDT)
  • Story Type: Security; Groups: OpenPKG
According to a security advisory published by Rapid7 [0], two vulnerabilities exists in the ISAKMP packet display functions of tcpdump [1]. The Common Vulnerabilities and Exposures (CVE) project has reviewed both problems. CAN-2004-0183 [2] identifies an overflow when displaying ISAKMP delete payloads with large number of SPIs, while CAN-2004-0184 [3] identifies an integer underflow when displaying ISAKMP identification payload. These vulnerabilities appear only when verbose packet display is enabled by running tcpdump with the -v option.

OpenPKG Alert: OpenPKG Security Advisory (mc)

  • Mailing list; By OpenPKG (Posted by dave on Apr 5, 2004 6:37 AM EDT)
  • Story Type: Security; Groups: OpenPKG
According to a message from Ilya Teterin posted on Bugtraq [0], the Midnight Commander application [1] uses a uninitialized buffer to handle symlinks in VFS. This allows attackers to execute arbitrary code during symlink conversion. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2003-1023 [2] to the problem.

OpenPKG Alert: OpenPKG Security Advisory (squid)

  • Mailing list (Posted by dave on Apr 1, 2004 9:17 AM EDT)
  • Story Type: Security; Groups: OpenPKG
According to a security advisory [0] from the vendor, a vulnerability exists in the URL unescaping logic of the Squid Web Proxy Cache [1]. This bug could allow an attacker to bypass certain access controls by inserting a NUL character into decoded URLs. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2004-0189 [2] to the problem.

OpenPKG Alert: OpenPKG Security Advisory (openssl)

  • Mailing list (Posted by dave on Mar 18, 2004 4:26 AM EDT)
  • Story Type: Security; Groups: OpenPKG
According to an OpenSSL security advisory, a denial of service vulnerabilities exist in OpenSSL versions 0.9.6c to 0.9.6l inclusive and versions 0.9.7a to 0.9.7c inclusive.

OpenPKG Alert: OpenPKG Security Advisory (uudeview)

  • Mailing list (Posted by dave on Mar 12, 2004 6:26 AM EDT)
  • Story Type: Security; Groups: OpenPKG
Alerted by a posting on Bugtraq [1] the UUDeview [2] package was reviewed. It was found that 0.5.19 and later contains a bug which leads to failure retrieving the filename during decode. All versions suffered from insecure temporary file handling. Version 0.5.20 contains bug fixes for the parsing of header lines, exact handling of maximum line length and fixes for two buffer overflows which needed backporting. The corected packages listed above remedy all of these problems.

OpenPKG Alert: OpenPKG Security Advisory (mutt)

  • Mailing list (Posted by dave on Mar 9, 2004 6:12 AM EDT)
  • Story Type: Security; Groups: OpenPKG
According to a posting on Bugtraq [0], a buffer overflow exists in the mail user agent Mutt [1]. It can be triggered by incoming messages and there are reports about spam that has actually triggered this problem and crashed Mutt. The bug was reported to Red Hat by Niels Heinen. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2004-0078 [2] to the problem.

OpenPKG Alert: OpenPKG Security Advisory (libtool)

According to a posting on Bugtraq [0], an issue regarding the insecure creation of a temporary directory exists in GNU libtool [1] versions before 1.5.2. Use of mkdir(1) along with option "-p" makes libtool vulnerable to symlink attacks. Stefan Nordhausen commited a fix that removes the use of option "-p" in version 1.5.2. Discussion on Bugtraq further indicates that an additional race condition issue exists in the same context using chmod(1), reported by Joseph S. Myers back in March 2000 [2]. The updated OpenPKG versions of libtool contain fixes for both issues.

LXer Weekly Security Roundup - Mar 01, 2004 to Mar 08, 2004

There were 16 security alerts issued last week:
  • 5 from Debian
  • 1 from Fedora
  • 2 from Fedora Legacy
  • 2 from Gentoo
  • 2 from Mandrake
  • 1 from OpenPKG
  • 1 from Red Hat
  • 2 from Trustix

OpenPKG Alert: OpenPKG Security Advisory (libxml)

  • Mailing list (Posted by dave on Mar 5, 2004 8:39 AM EDT)
  • Story Type: Security; Groups: OpenPKG
A flaw in the HTTP and FTP client sub-library of libxml2 [0] found by Yuuichi Teranishi can be exploited to cause a buffer overflow if passed a very long URL [1]. This could be used by an attacker to execute arbitrary code on the host computer. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2004-0110 [2] to the problem.

OpenPKG 2.0 released

The OpenPKG project releases version 2.0 of the unique cross-platform software packaging facility.

OpenPKG Security Advisory (tcpdump)

  • Mailing list (Posted by dave on Jan 16, 2004 5:12 AM EDT)
  • Story Type: Security; Groups: OpenPKG
A bunch of vulnerabilities in tcpdump [0] were found and addressed in the past. All of them are in the area of packet decoding. Faulty decoder functions can result in denial of service attacks through infinite loops, memory starvation and application crashes. In the worst case arbitrary code execution is possible.

( 1 2 ... 3 ) Next »

  Add more filters
Filter by Groups:

Filter by Story Type:

 
Timer: 124.66 jiffies (1.24657 seconds)