This time we have three libraries previously shipped as a part
of Digikam SC separated, this commit links them to build altogether.
Thanks to sthen@ and czarkoff@ for reviewing considerable part of work.
instructions are meant to work on a fresh install.
- easy cases: replace some '$ sudo somecommand' with '# somecommand'
(while there I've swapped some "${RCDIR}/foo start" with "rcctl foo start").
- replace some 'sudo -u user somecommand foo bar' with
'su -s /bin/sh user "/path/to/somecommand foo bar"' and similar.
Not pretty with the -s, but many of the uids that need to run
these commands have /sbin/nologin as their usual shell.
Manubulon SNMP plugins is a set of Icinga/Nagios plugins to check various
types of device using SNMP, including amongst others:
check_snmp_storage storage (disks, swap, memory, etc...) using MIB-2
check_snmp_int network interface state and usage using MIB-2
check_snmp_process process-related checks using MIB-2
check_snmp_load load/cpu checks for various OS/network devices
check_snmp_mem memory/swap usage checks for various OS/network devices
check_snmp_win Windows services
check_snmp_env environmental status for various network devices
See http://nagios.manubulon.com for more details.
The original project was last active in 2007; this version is packaged
from a lightly maintained git repository.
ConfigItem::ActivateItems() calls DynamicObject::RestoreObjects().
DynamicObject::RestoreObjects() runs to the last line of the function,
however control is not returned to the following line in
ConfigItem::ActivateItems() (i.e. the calling function).
(uncommon) conditions; if:
- remote configuration of ntpd is enabled (it's disabled by default),
- and an attacker knows the remote configuration password,
- and has access to a computer that is allowed to send remote configuration
requests to ntpd,
the attacker can send a carefully-crafted packet to ntpd that will cause ntpd
to crash.
Upstream has changed from providing a .war file to providing an unpackaged
webroot instead, so this won't upgrade cleanly. First pkg_delete unifi,
then rm -rf /usr/local/share/unifi/webapps/ROOT, then install. We can't
provide built packages of this port anyway, so this is relatively low
impact.