[DSA 1916-1] New kdelibs packages

2009-11-04 Thread Thilo Six
Hello security members DSA 1916-1 has been announced on 23rd of october but still there are no packages available on the mirrors. The DSA said: <- *snip* -> Due to a bug in the archive system, the fix for the stable distribution (lenny), will be released as version 4:3.5.10.dfsg.1-0lenny3 once i

Re: Debian 4.0 and mmap_min_addr null pointer dereference flaw

2009-11-04 Thread Rick Moen
Quoting john (lists.j...@gmail.com): > I see that there is another null pointer dereference flaw being talked about. > http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/ > > It looks like we can take step in Debian 5.0 to mitigate this threat by > setting > echvm.mmap_min_addr =

Re: Debian 4.0 and mmap_min_addr null pointer dereference flaw

2009-11-04 Thread Dominic Hargreaves
On Wed, Nov 04, 2009 at 09:24:55AM -0800, john wrote: > On Wed, Nov 4, 2009 at 9:15 AM, Dominic Hargreaves wrote: > > The mmap_min_addr tuneabout was not introduced until after 2.6.18, > > which is the default etch kernel. I am using the 'etchnhalf' kernel > > (linux-image-2.6.24-etchnhalf*) on a

Re: Debian 4.0 and mmap_min_addr null pointer dereference flaw

2009-11-04 Thread dann frazier
On Wed, Nov 04, 2009 at 09:24:55AM -0800, john wrote: > On Wed, Nov 4, 2009 at 9:15 AM, Dominic Hargreaves wrote: > > On Wed, Nov 04, 2009 at 09:05:20AM -0800, john wrote: > >> I see that there is another null pointer dereference flaw being talked > >> about. > >> http://www.theregister.co.uk/200

Re: Debian 4.0 and mmap_min_addr null pointer dereference flaw

2009-11-04 Thread john
> > presumably you mean > > vm.mmap_min_addr = 4096 > > not > > echvm.mmap_min_addr = 4096 > > ? > > micah > Hi Micah, Yes sorry about that. I meant to write vm.mmap_min_addr but I quoted from the Debian wiki which showed how to change the value for echvm.mmap_min_addr I am a noob and haven't h

Re: Debian 4.0 and mmap_min_addr null pointer dereference flaw

2009-11-04 Thread dann frazier
On Wed, Nov 04, 2009 at 09:05:20AM -0800, john wrote: > Hello all, > > I see that there is another null pointer dereference flaw being talked about. > http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/ > > It looks like we can take step in Debian 5.0 to mitigate this threat by >

Re: Debian 4.0 and mmap_min_addr null pointer dereference flaw

2009-11-04 Thread Dominic Hargreaves
On Wed, Nov 04, 2009 at 09:05:20AM -0800, john wrote: > I see that there is another null pointer dereference flaw being talked about. > http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/ > > It looks like we can take step in Debian 5.0 to mitigate this threat by > setting > echvm

Re: Debian 4.0 and mmap_min_addr null pointer dereference flaw

2009-11-04 Thread john
On Wed, Nov 4, 2009 at 9:15 AM, Dominic Hargreaves wrote: > On Wed, Nov 04, 2009 at 09:05:20AM -0800, john wrote: >> I see that there is another null pointer dereference flaw being talked about. >> http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/ >> >> It looks like we can take

Debian 4.0 and mmap_min_addr null pointer dereference flaw

2009-11-04 Thread john
Hello all, I see that there is another null pointer dereference flaw being talked about. http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/ It looks like we can take step in Debian 5.0 to mitigate this threat by setting echvm.mmap_min_addr = 4096 per http://wiki.debian.org/mmap_

to: Henri Salvo

2009-11-04 Thread Bernie Dolan
Hi, I tried to send a copy of the file to you but got the following error: he...@nerv.fi SMTP error from remote mail server after RCPT TO:: host kiwai.nerv.fi [213.157.65.70]: 554 5.7.1 Service unavailable; Client host [64.222.186.12] blocked using dnsbl.dronebl.org - When a machine

Re: dt_ssh5

2009-11-04 Thread Henri Salo
On Wed, 04 Nov 2009 09:30:35 -0500 Bernie Dolan wrote: > Hi, > I recently became aware of the executable: > dt_ssh5 > in my /tmp subdirectory. > > Seems this is a botnet that is trying brute force attacks from my > server. Has anybody else seen this? > > Thanks for the prompt response. >

dt_ssh5

2009-11-04 Thread Bernie Dolan
Hi, I recently became aware of the executable: dt_ssh5 in my /tmp subdirectory. Seems this is a botnet that is trying brute force attacks from my server. Has anybody else seen this? Thanks for the prompt response. - When a machine begins to run without human aid, it is time to scrap it -