Hello security members
DSA 1916-1 has been announced on 23rd of october but still there are no
packages available on the mirrors.
The DSA said:
<- *snip* ->
Due to a bug in the archive system, the fix for the stable distribution
(lenny), will be released as version 4:3.5.10.dfsg.1-0lenny3 once i
Quoting john (lists.j...@gmail.com):
> I see that there is another null pointer dereference flaw being talked about.
> http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
>
> It looks like we can take step in Debian 5.0 to mitigate this threat by
> setting
> echvm.mmap_min_addr =
On Wed, Nov 04, 2009 at 09:24:55AM -0800, john wrote:
> On Wed, Nov 4, 2009 at 9:15 AM, Dominic Hargreaves wrote:
> > The mmap_min_addr tuneabout was not introduced until after 2.6.18,
> > which is the default etch kernel. I am using the 'etchnhalf' kernel
> > (linux-image-2.6.24-etchnhalf*) on a
On Wed, Nov 04, 2009 at 09:24:55AM -0800, john wrote:
> On Wed, Nov 4, 2009 at 9:15 AM, Dominic Hargreaves wrote:
> > On Wed, Nov 04, 2009 at 09:05:20AM -0800, john wrote:
> >> I see that there is another null pointer dereference flaw being talked
> >> about.
> >> http://www.theregister.co.uk/200
>
> presumably you mean
>
> vm.mmap_min_addr = 4096
>
> not
>
> echvm.mmap_min_addr = 4096
>
> ?
>
> micah
>
Hi Micah,
Yes sorry about that. I meant to write vm.mmap_min_addr
but I quoted from the Debian wiki which showed
how to change the value for echvm.mmap_min_addr
I am a noob and haven't h
On Wed, Nov 04, 2009 at 09:05:20AM -0800, john wrote:
> Hello all,
>
> I see that there is another null pointer dereference flaw being talked about.
> http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
>
> It looks like we can take step in Debian 5.0 to mitigate this threat by
>
On Wed, Nov 04, 2009 at 09:05:20AM -0800, john wrote:
> I see that there is another null pointer dereference flaw being talked about.
> http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
>
> It looks like we can take step in Debian 5.0 to mitigate this threat by
> setting
> echvm
On Wed, Nov 4, 2009 at 9:15 AM, Dominic Hargreaves wrote:
> On Wed, Nov 04, 2009 at 09:05:20AM -0800, john wrote:
>> I see that there is another null pointer dereference flaw being talked about.
>> http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
>>
>> It looks like we can take
Hello all,
I see that there is another null pointer dereference flaw being talked about.
http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
It looks like we can take step in Debian 5.0 to mitigate this threat by setting
echvm.mmap_min_addr = 4096
per http://wiki.debian.org/mmap_
Hi,
I tried to send a copy of the file to you but got the following error:
he...@nerv.fi
SMTP error from remote mail server after RCPT TO::
host kiwai.nerv.fi [213.157.65.70]: 554 5.7.1 Service unavailable;
Client host [64.222.186.12] blocked using dnsbl.dronebl.org
-
When a machine
On Wed, 04 Nov 2009 09:30:35 -0500
Bernie Dolan wrote:
> Hi,
> I recently became aware of the executable:
> dt_ssh5
> in my /tmp subdirectory.
>
> Seems this is a botnet that is trying brute force attacks from my
> server. Has anybody else seen this?
>
> Thanks for the prompt response.
>
Hi,
I recently became aware of the executable:
dt_ssh5
in my /tmp subdirectory.
Seems this is a botnet that is trying brute force attacks from my
server. Has anybody else seen this?
Thanks for the prompt response.
-
When a machine begins to run without human aid, it is time to scrap it -
12 matches
Mail list logo