Re: MIT discovered issue with gcc

2013-11-23 Thread Michael Tautschnig
[...] > Isn't it interesting that their one example will potentially dereference > the null pointer even before compiler optimizations (from the paper): > > struct tun_struct *tun=; > struct sock *sk = tun->sk; > if(*tun) return POLLERR; > > The check to see that tun is non-null should occur

Re: MIT discovered issue with gcc

2013-11-23 Thread Michael Tautschnig
Hi Andrew, hi all, > I understand that Debian has a bunch of vulnerabilities as described in > the following PDF. > > http://pdos.csail.mit.edu/~xi/papers/stack-sosp13.pdf > > Just a small quote: > > "This paper presents the first systematic approach for > reasoning about and detecting unstable

Re: Fwsnort: --hex-string syntax bug

2011-07-29 Thread Michael Tautschnig
Hi, > I've been trying to file a bug report trough the bug report tool of > Debian. But without a succes. > So I'll just inform you all about this bug since I do want to inform you > about it. > I'm sorry this isn't the proper method, but bugreport isn't cooperative > with my SMTP for some reason.

Re: ClamAV update to 0.97 for Lenny (oldstable)

2011-03-15 Thread Michael Tautschnig
Hi all, > On Sat, Mar 12, 2011 at 08:11:27AM -0800, tabris wrote: > > On 2/25/11 6:56 AM, CamaleĆ³n wrote: > > > I just have read this notice: > > > > > > http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1003 > > > > > > And wonder if it is foreseen an update for Lenny's ClamAV to 0.97 that

Re: [SECURITY] [DSA 2118-1] New subversion packages fix authentication bypass

2010-10-08 Thread Michael Tautschnig
Hi, > --- > Debian Security Advisory DSA-2118-1 secur...@debian.org > http://www.debian.org/security/ Nico Golde > October 8th, 2010http://www.debian

Re: jedit_4.3.1+dfsg-1_amd64.changes REJECTED

2010-04-05 Thread Michael Tautschnig
[...] > > I would proceed in this way: > bsh: add bsh-src binary creation > jedit: > - remove Debian bsh sources (added to the rejected package [2]) > - add bsh-src as builddep I think if you do a versioned builddep (exact version) then at the very latest an archive rebuild will ensure that jedi

Re: jedit_4.3.1+dfsg-1_amd64.changes REJECTED

2010-04-03 Thread Michael Tautschnig
> * Gabriele Giacone: > > > For example openjdk-6-source: source code is in both orig tarball and > > openjdk-6-source binary package. This is a duplication, isn't it? > > First, the duplication refers to source packages. Second, > openjdk-6-source is like the emacs*-el packages, it provides IDE

Re: clamav 0.95.3+dfsg-1~volatile1 and rar files

2009-12-06 Thread Michael Tautschnig
> Hi ! > The latest clamav 0.95.3+dfsg-1 from volatile knows howto scan rar > files natively ? The --unrar option doesn't work anymore and the > EICAR is not detected: > > #clamscan --scan-archive=yes --verbose --unrar=/usr/bin/unrar > eicar.rar WARNING: Ignoring deprecated option --unrar [...]

Re: [Secure-testing-team] Security support for volatile?

2009-03-13 Thread Michael Tautschnig
> This one time, at band camp, Michael Stone said: > > On Mon, Feb 23, 2009 at 07:27:14PM +0100, Kurt Roeckx wrote: > > >I think one the reason why clamav is in volatile is that the engine > > >might need updating to detect new viruses. Is that something you > > >want to support in stable-security

Re: Scalable Debian vulnerability tracking

2009-01-06 Thread Michael Tautschnig
> > Hi folks, > > I work for an hosting provider, and am looking at how to improve > visibility into vulnerability exposure. > > We have over 800 Debian hosts that we manage fore customers, and will > have over 1,000 by the end of this quarter. > > A major problem we face is that our change d

Re: [SECURITY] [DSA 1680-1] New clamav packages fix potential codeexecution

2008-12-10 Thread Michael Tautschnig
> On Wed, Dec 10, 2008 at 13:21, Dominic Hargreaves <[EMAIL PROTECTED]> wrote: > > I don't really understand your question. There is no separate security > > archive for volatile, as I understand it. > > Oddly enough I understood Tony, yet I don't understand the > Volative+ClamAV situation. Can s

Re: [SECURITY] [DSA 1680-1] New clamav packages fix potential code execution

2008-12-05 Thread Michael Tautschnig
[...] > > This looks like quite a serious bug (remote arbitrary code execution). > Are there any plans for an update to volatile? > The fixed version has been uploaded to volatile already and got accepted [1], but probably is still being built!? Best, Michael [1] http://lists.alioth.debian.or

Re: What to do about SSH brute force attempts?

2008-08-22 Thread Michael Tautschnig
> On Thursday 21 August 2008 11:33:51 Michael Tautschnig wrote: > > Hi all, > > > > since two days (approx.) I'm seeing an extremely high number of apparently > > coordinated (well, at least they are trying the same list of usernames) > > brute force attempts

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
> * Michael Tautschnig <[EMAIL PROTECTED]> [2008-08-21 07:35-0400]: > > Hi all, > > > > since two days (approx.) I'm seeing an extremely high number of apparently > > coordinated (well, at least they are trying the same list of usernames) > > brute >

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
> Assuming that your system is secured as well as can be, and that your > question is not about how to fend off attacks but rather how to stop your > attackers from being able to continue, isn't this the kind of thing that the > police or other law enforcement agencies would normally investigate? >

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
> Hi, > > * use a Firewall to prevent other IP address to connect to your ssh > service. restrict just to yours (iptables script can be easy to find on > the web) Well, I should have added that my hosts must be world-wide accessible using password-based authentication, so this is no option. > * u

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
> On Thu, Aug 21, 2008 at 04:33:51PM +0200, Michael Tautschnig wrote: > > > Further, what do you guys do about such attacks? Just sit back and hope > > they don't get hold of any passwords? Any ideas are welcome... > > Port knocking is a useful technique I'

What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
Hi all, since two days (approx.) I'm seeing an extremely high number of apparently coordinated (well, at least they are trying the same list of usernames) brute force attempts from IP addresses spread all over the world. I've got denyhosts and an additional iptables based firewall solution in plac

Re: [SECURITY] [DSA 1353-1] New tcpdump packages fix arbitrary code execution

2007-08-11 Thread Michael Tautschnig
I'm out of office until the 19th of August. Afterwards, I will try to respond to your message as soon as possible. Best regards, Michael Tautschnig -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]