Home Search
i386 - search results
If you're not happy with the results, please do another search
Linux kernel 2.5.1 released
Author: JT Smith
Linux kernel version 2.5.1 has been released. It is available from:
Patch: ftp://ftp.kernel.org/pub/linux/kernel/v2.5/patch-2.5.1.gz
Full...
Debian: ‘postfix’ remote DoS
Author: JT Smith
Debian: "Wietse Venema reported he found a denial of service vulnerability in postfix. The SMTP session log that postfix keeps for debugging...
FreeBSD: Update – ‘OpenSSH’ Privilege escalation vulnerability
Author: JT Smith
FreeBSD: "hen the OpenSSH server `sshd' is configured to use the system's login program (via the directive `UseLogin yes' in sshd_config), this...
RedHat: ‘secureweb’ directory listing vulnerability
Author: JT Smith
Red Hat: "Updated packages are now available for Red Hat Secure Web Server 3.2 (U.S.). These updates close a potential security hole...
SuSE: SSH update
Author: JT Smith
SuSE: "Our last openssh security announcement SuSE-SA:2001:044 (*) may falsely lead to assume that the openssh-2.9.9p2 update packages on our ftp server...
Mandrake Linux Community Newsletter – Issue #21
Author: JT Smith
This Week's Summary: Mandrake Linux 8.1 for Itanium; Mandrake Linux
Users Club Update; Introducing the MandrakeSecure website; Mandrake in
the News; What's...
2.4.17-pre5 out
Author: JT Smith
Kernel.org: It looks like Linux kernel 2.4.17-pre5 is now out. Ah, it seems like only yesterday we were compiling that old newest...
Linux kernel 2.4.17-pre2 has been released
Author: JT Smith
Dave reports that Linux kernel 2.4.17-pre2 has been released. Read more for the Changelog...- Remove userland header from bonding driver ...
Conectiva: wu-ftpd security announcement
Author: JT Smith
Conectiva: "CORE Security Technologies reported a vulnerability in the wu-ftpd ftp server that can be exploited remotely. The problem is in the...
SuSE: ‘wuftpd’ Remote buffer overflow vulnerability
Author: JT Smith
SuSE: "The CORE ST Team had found an exploitable bug in all versions of wuftpd's ftpglob() function... This bug could be exploited...