On Sat, 20 Mar 2004 05:14, Phillip Hofmeister <[EMAIL PROTECTED]> wrote:
> On another note, The GRSecurity/SELinux patches mitigate a lot of kernel
> vulnerabilities and userland vulnerabilities. If you are running your
> own kernel you may wish to look at them.
Nothing protects you against kerne
Yo!
So far, my experience was with administrating smallish servers and mostly
stand-alone clients. The future shines bright, however, and I may soon be in
a position to do much more than that. But, lacking experience, I now need
some advice.
[debian-security CC:ed since people there certainly
On Saturday 20 Mar 2004 1:56 am, Nick Boyce wrote:
> Couldn't it say something like
> OpenSSL> version
> OpenSSL 0.9.6c - Debian 19 jan 2004
I meant "19 mar 2004" ...
It's been a long day :-/
Cheers,
Nick Boyce
Bristol, UK
Slightly topical question ... I just installed the OpenSSL security
update, and then fired it up ... and asked it what its version is :
OpenSSL> version
OpenSSL 0.9.6c 21 dec 2001
glimmer:~$ dpkg -l openssl
ii openssl 0.9.6c-2.woody.6 Secure Socket Layer (SSL) ..
and wondere
On Sat, 20 Mar 2004 05:14, Phillip Hofmeister <[EMAIL PROTECTED]> wrote:
> On another note, The GRSecurity/SELinux patches mitigate a lot of kernel
> vulnerabilities and userland vulnerabilities. If you are running your
> own kernel you may wish to look at them.
Nothing protects you against kerne
Yo!
So far, my experience was with administrating smallish servers and mostly
stand-alone clients. The future shines bright, however, and I may soon be in
a position to do much more than that. But, lacking experience, I now need
some advice.
[debian-security CC:ed since people there certainly
On Saturday 20 Mar 2004 1:56 am, Nick Boyce wrote:
> Couldn't it say something like
> OpenSSL> version
> OpenSSL 0.9.6c - Debian 19 jan 2004
I meant "19 mar 2004" ...
It's been a long day :-/
Cheers,
Nick Boyce
Bristol, UK
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "
Slightly topical question ... I just installed the OpenSSL security
update, and then fired it up ... and asked it what its version is :
OpenSSL> version
OpenSSL 0.9.6c 21 dec 2001
glimmer:~$ dpkg -l openssl
ii openssl 0.9.6c-2.woody.6 Secure Socket Layer (SSL) ..
and wondere
On Freitag, 19. März 2004 19:28, Peter McAlpine wrote:
> So I'm looking for hints and tips about migrating from rsh to ssh.
> Comments? Suggestions? All are appreciated!
Mostly, your tools / usage is just an "rsh hostname" or "rsh hostname
command". Install SSHDs and ssh and change the "r" for an
Hello,
The company I just started working for has grown out of the 80s and uses
networking extensively in all of its services. We currently use rsh and
rcp EXTENSIVELY to move between 40-60 computers through a frame, and our
customers are getting more and more interested in hearing what our
securi
pgpXhKEcgiYVU.pgp
Description: PGP message
On Freitag, 19. März 2004 19:28, Peter McAlpine wrote:
> So I'm looking for hints and tips about migrating from rsh to ssh.
> Comments? Suggestions? All are appreciated!
Mostly, your tools / usage is just an "rsh hostname" or "rsh hostname
command". Install SSHDs and ssh and change the "r" for an
Hello,
The company I just started working for has grown out of the 80s and uses
networking extensively in all of its services. We currently use rsh and
rcp EXTENSIVELY to move between 40-60 computers through a frame, and our
customers are getting more and more interested in hearing what our
securi
pgp0.pgp
Description: PGP message
Hello!
On 19 Mar 2004 at 14:03 +0100, Sebastian Schmitt wrote:
> > > is there a kernel patch/update for the 'do_mremap VMA limit local
> > > privilege escalation vulnerability' described in
> > > http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
> >
> > That link provides the CVE ident
[...]
> > is there a kernel patch/update for the 'do_mremap VMA limit local
> > privilege escalation vulnerability' described in
> > http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
>
> That link provides the CVE identification CAN-2004-0077.
>
> http://cve.mitre.org/cgi-bin/cvename.c
On Fri, Mar 19, 2004 at 12:56:15 +0100, Sebastian Schmitt wrote:
> is there a kernel patch/update for the 'do_mremap VMA limit local
> privilege escalation vulnerability' described in
> http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
That link provides the CVE identification CAN-2004-
Hi,
is there a kernel patch/update for the
'do_mremap VMA limit local privilege escalation vulnerability' described in
http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
i have the kernel 2.4.22-2-686-smp running and do security updates on a daily
basis. But im still vulnerable, as
Hello!
On 19 Mar 2004 at 14:03 +0100, Sebastian Schmitt wrote:
> > > is there a kernel patch/update for the 'do_mremap VMA limit local
> > > privilege escalation vulnerability' described in
> > > http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
> >
> > That link provides the CVE ident
[...]
> > is there a kernel patch/update for the 'do_mremap VMA limit local
> > privilege escalation vulnerability' described in
> > http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
>
> That link provides the CVE identification CAN-2004-0077.
>
> http://cve.mitre.org/cgi-bin/cvename.c
On Fri, Mar 19, 2004 at 12:56:15 +0100, Sebastian Schmitt wrote:
> is there a kernel patch/update for the 'do_mremap VMA limit local
> privilege escalation vulnerability' described in
> http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
That link provides the CVE identification CAN-2004-
Hi,
is there a kernel patch/update for the
'do_mremap VMA limit local privilege escalation vulnerability' described in
http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt ?
i have the kernel 2.4.22-2-686-smp running and do security updates on a daily
basis. But im still vulnerable, as
22 matches
Mail list logo