On Fri, Jan 23, 2009 at 11:52 PM, Brad Nicholes wrote:
>>> * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0242
>>>
>>> "Ganglia 3.1.1 allows remote attackers to cause a denial of service via
>>> a request to the gmetad service with a path does not exist, which causes
>>> Ganglia to (
On Thu, Jan 22, 2009 at 6:55 PM, Carlo Marcelo Arenas Belon
wrote:
> the interactive port was designed to mimic the behaviour from the
> original gmetad port which always returns the whole tree.
why's that? if I wanted the whole tree I'd query the non interactive
port, instead I'm asking for spec
Hi,
I've been thinking about the python module interface and how best to use it.
Gmond uses a single thread that executes the callback function for
every metric of every module
in a scheduled fashion...
This seems like a brittle design that won't scale for many metrics.
If a developer writes a mod
>>> On 1/23/2009 at 3:11 AM, in message <20090123101118.gc29...@sajinet.com.pe>,
Carlo Marcelo Arenas Belon wrote:
> On Fri, Jan 23, 2009 at 10:36:19AM +0100, Ramon Bastiaans wrote:
>> I saw this pass by on my RSS feeds, not sure if you guys are aware of
>> these yet?
>
> yes, they were reported
On Fri, Jan 23, 2009 at 10:36:19AM +0100, Ramon Bastiaans wrote:
> I saw this pass by on my RSS feeds, not sure if you guys are aware of
> these yet?
yes, they were reported originally here :
http://www.mail-archive.com/ganglia-developers@lists.sourceforge.net/msg04929.html
> * http://web.nv
I saw this pass by on my RSS feeds, not sure if you guys are aware of
these yet?
* http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0241
"Stack-based buffer overflow in the process_path function in
gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a
denial of service (cr