(Solved) Begin: Running /scripts/local-block

(Solved) Begin: Running /scripts/local-block

  (Solved) Begin: Running /scripts/local-block Questo tipo di errore è figlio di quest’altro “start job is running for dev-disk-by…(1min 30s)”, che generalmente indica un problema con la partizione di swap. Quando si hanno più distro su uno stesso hard disk è cosa comune condividere la partizione di swap, ma purtroppo questa ultima genera questo tipo … Leggi tutto “(Solved) Begin: Running /scripts/local-block”

The post (Solved) Begin: Running /scripts/local-block appeared first on Edmond’s Weblog.

How to compile kernel 4.13.7 on Debian 9.2

How to compile kernel 4.13.7 on Debian 9.2

  How to compile kernel 4.13.7 on Debian 9.2 Il kernel 4.13 porta con se diverse novità, e ad oggi si può ottenere installandolo da Debian Testing, oppure provare a compilarlo direttamente su Debian Stretch 9.2. L’unico problema è la mancanza del pacchetto kernel-package che bisogna procurarselo dai repo testing: # echo ‘deb http://ftp.it.debian.org/debian/ testing … Leggi tutto “How to compile kernel 4.13.7 on Debian 9.2”

The post How to compile kernel 4.13.7 on Debian 9.2 appeared first on Edmond’s Weblog.

Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call

Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call

The “String.prototype.replace” method can be inlined in the JIT process. So in the method, all the calls which may break the JIT assumptions must be invoked with updating “ImplicitCallFlags”. But “RegexHelper::StringReplace” calls the replace function without updating the flag. Therefore it fails to detect if a user function was called. Source: Microsoft Edge Chakra JIT […]

The post Microsoft Edge Chakra JIT Failed RegexHelper::StringReplace Call appeared first on MondoUnix.

Shadowsocks Log Manipulation / Command Execution

Shadowsocks Log Manipulation / Command Execution

Several issues have been identified, which allow attackers to manipulate log files, execute commands and to brute force Shadowsocks with enabled autoban.py brute force detection. Brute force detection from autoban.py does not work with suggested tail command. The key of captured Shadowsocks traffic can be brute forced. The latest commit 2ab8c6b on Sep 6, 2017 […]

The post Shadowsocks Log Manipulation / Command Execution appeared first on MondoUnix.

Opentext Documentum Content Server File Hijack / Privilege Escalation

Opentext Documentum Content Server File Hijack / Privilege Escalation

Opentext Documentum Content Server (formerly known as EMC Documentum Content Server) does not properly validate input of the PUT_FILE RPC command which allows any authenticated user to hijack arbitrary file from the Content Server filesystem. Because some files on the Content Server filesystem are security-sensitive this security flaw leads to privilege escalation. Source: Opentext Documentum […]

The post Opentext Documentum Content Server File Hijack / Privilege Escalation appeared first on MondoUnix.