Hi,
Am 16.08.19 um 22:40 schrieb Holger Levsen:
> On Fri, Aug 16, 2019 at 08:11:58PM +0000, Markus Koschany wrote:
>> Markus Koschany pushed to branch master at Debian Security Tracker /
>> security-tracker
>>
>> Commits:
>> bc35662f by Markus Koschany at 2019-
rried.
Kind regards
Markus
-package/openssh
Regards,
Markus
Ich werde ab 23.12.2010 nicht im Büro sein. Ich kehre zurück am
10.01.2011.
In dringenden Fällen wenden Sie sich an Herrn Geiß
Email: dieter.ge...@infraserv-wi.de
Tel. 0611 / 962 8853
oder an Herrn Huprich
Email: hupr...@infraserv-wi.de
Tel. 0611 / 962 5330
Ich werde ab 23.08.2010 nicht im Büro sein. Ich kehre zurück am
30.08.2010.
In dringenden Fällen wenden Sie sich an Herrn Geiß
Email: dieter.ge...@infraserv-wi.de
Tel. 0611 / 962 8853
regards
Markus Katz
Hinweis: Dies ist eine automatische Antwort auf Ihre Nachricht "Re:
btdownloadgui failed due to firewall" gesendet am 18.07.2010 21:27:35.
Diese ist die einzige Benachrichtigung, die Sie empfangen werden, während
diese Person abwesend ist.
Steria Mummert Con
Ich werde ab 08.05.2008 nicht im Büro sein. Ich kehre zurück am
28.02.2010.
Markus Bühler arbeitet nicht mehr bei der V-ZUG AG. In dringenden Fälle
wenden Sie sich bitte an Markus Fleischli ([EMAIL PROTECTED]).
Freundliche Grüsse
M. Bühler
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with
a secure (OpenPGP) email
> ssuds.sourceforge.net - A Simple Sudoku Solver and Generator
>
hi Celejar,
depending on the level of security you'd like you may be continue thinking
about it.
If you receive this "complain" on your desktop box and you don't have highly
im
Hi all,
we have a firewall with debian 3.0 running with a 2.4.27 kernel. The
problem is that one of our nets
was completly unavailable from the internet..
The interface is a SOEKRIS 4 port NIC with ... kernel module NATSEMI
in the log:
" Jun 28 14:35:12 fw1 kernel: eth3: Oversized(?) Ethernet
Jeroen van Wolffelaar wrote on Wed, Jun 29, 2005 at 19:14:59 +0200:
> On Wed, Jun 29, 2005 at 06:50:51PM +0200, Markus Kolb wrote:
> >
> > Your patch does the same in fixing #315115 for Sarge.
> > In addition your patch changes a few other trivial things not in
> > rel
Jeroen van Wolffelaar wrote on Wed, Jun 29, 2005 at 16:06:59 +0200:
>
> That being said, I failed to find the actual patch/package in the
> original mail in this thread. Could you please download the fixed
> packages as referenced in #315115, and (1) check whether they work and
> not have regressi
Javier Fernández-Sanguino Peña wrote on Wed, Jun 29, 2005 at 09:28:37 +0200:
> On Tue, Jun 28, 2005 at 05:36:13PM +0200, Markus Kolb wrote:
> > Hello,
> >
> > I've done a fix for sudo of sarge. Code from new upstream version.
>
> Did you check the BTS? Please read
Sven Hoexter wrote on Tue, Jun 28, 2005 at 20:05:47 +0200:
> On Tue, Jun 28, 2005 at 05:45:41PM +0200, Markus Kolb wrote:
> > Hi,
> >
> > why security team doesn't ask for help if they have not enough time for
> > and problems with package fixing?
> >
Hi,
why security team doesn't ask for help if they have not enough time for
and problems with package fixing?
I can help.
I need only a security team member for contact and maybe a debian member
to sign my gnupg key.
Bye
Markus
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a su
Hello,
I've done a fix for sudo of sarge. Code from new upstream version.
Who is willing to check and update?
Version: 1.6.8p7-1.2
Distribution: unstable
Urgency: high
Maintainer: Markus Kolb <[EMAIL PROTECTED]>
Changed-By: Markus Kolb <[EMAIL PROTECTED]>
Description:
sud
kages in sarge are not SE-enabled? Are there newer/current packages
somewhere around (didn't find anything on apt-get.org and google)?
best regards,
Markus
T
> done
I did define server_ports="23" for telnet. I even added -m mport.
I'm sorry, I could get neither to fly. It said
iptables: No chain/target/match by that name.
Currently I just want it to wor
* 255.255.255.0 U 0 00 eth1
-----
| Dipl. Inform. Markus Trümper ||
| | Daewoo Automobile Deutschland GmbH |
| email: [EMAIL PROTECTED] | Lindenstraße 110
FORWARD -t filter -i $LAN_IF -m state --state NEW,ESTABLISHED,RELATED -j
ACCEPT
----
Thanks in advance
Markus
--
e was used...
best regards
markus
Jan Minar wrote:
On Wed, Jan 21, 2004 at 01:28:32AM +0100, Markus Schabel wrote:
I don't know what the surrounding lines are, but the core of your
posting is a wget(1) logfile/stderr output :-) This isn't the standard
wget in the main distribution; IIRC, it's the busybox'
ed...
best regards
markus
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Jan Minar wrote:
On Wed, Jan 21, 2004 at 01:28:32AM +0100, Markus Schabel wrote:
I don't know what the surrounding lines are, but the core of your
posting is a wget(1) logfile/stderr output :-) This isn't the standard
wget in the main distribution; IIRC, it's the busybox'
2 2004] [error] [client 217.24.233.220] File does not exist: /var/www/sammy/www/bc-nrw/images/halb_banner_med.jpg
best regards
Markus
2 2004] [error] [client 217.24.233.220] File does not exist: /var/www/sammy/www/bc-nrw/images/halb_banner_med.jpg
best regards
Markus
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Thu, 15 Jan 2004 12:15:45 -0800
Hans Baume <[EMAIL PROTECTED]> wrote:
> Does anyone have any tips
> on how to do it?
I wrote some lines about this:
http://homex.subnet.at/~max/debian/mirror.php
Cheers,
Max
--
The first time any man's freedom is trodden on, we're all damaged.
On Thu, 15 Jan 2004 12:15:45 -0800
Hans Baume <[EMAIL PROTECTED]> wrote:
> Does anyone have any tips
> on how to do it?
I wrote some lines about this:
http://homex.subnet.at/~max/debian/mirror.php
Cheers,
Max
--
The first time any man's freedom is trodden on, we're all damaged.
-oOOo-(_)-oOOo--+
| Markus Schabel TGM - Die Schule der Technik www.tgm.ac.at |
| IT-Service A-1200 Wien, Wexstrasse 19-23 net.tgm.ac.at |
| [EMAIL PROTECTED] Tel.: +43(1)33126/316 |
| [EMAIL PROTECTED] Fax.: +43(1)33126/154 |
| FSF Associate Member #597,
-oOOo--+
| Markus Schabel TGM - Die Schule der Technik www.tgm.ac.at |
| IT-Service A-1200 Wien, Wexstrasse 19-23 net.tgm.ac.at |
| [EMAIL PROTECTED] Tel.: +43(1)33126/316 |
| [EMAIL PROTECTED] Fax.: +43(1)33126/154 |
| FSF Associate Member #597, Linux
Diego Brouard wrote:
El Miércoles, 17 de Septiembre de 2003 21:29, Markus Schabel
escribió:
Hello!
I've seen some strange things on my (stable with security-updates)
server: the last apt-get update didn't work because gzip
segfaultet. I've copied gzip from another server over
Diego Brouard wrote:
El Miércoles, 17 de Septiembre de 2003 21:29, Markus Schabel
escribió:
Hello!
I've seen some strange things on my (stable with security-updates)
server: the last apt-get update didn't work because gzip
segfaultet. I've copied gzip from another server over the
s
- known unclosed security hole?
It seems that it was possible to upload & execute .php-files somewhere
(phpshell.php)
- some nice scripts like 'rootshell.php'? ;)
no. at least not found till now.
- perl without tainting checks in cgi-bin?
what exactly do you mean? how
Phillip Hofmeister wrote:
On Thu, 18 Sep 2003 at 09:08:28AM +0200, Markus Schabel wrote:
scp goodserver:/bin/gzip /bin/gzip
NO! Since there's the chance that the server got hacked I'm not
interested to give him other passwords. copied from the other server
via scp.
scp from
ed security hole?
It seems that it was possible to upload & execute .php-files somewhere
(phpshell.php)
- some nice scripts like 'rootshell.php'? ;)
no. at least not found till now.
- perl without tainting checks in cgi-bin?
what exactly do you mean? how can i do/check that?
th
Phillip Hofmeister wrote:
On Thu, 18 Sep 2003 at 09:08:28AM +0200, Markus Schabel wrote:
scp goodserver:/bin/gzip /bin/gzip
NO! Since there's the chance that the server got hacked I'm not
interested to give him other passwords. copied from the other server
via scp.
scp from the cl
kill -15292 pid
kill 15292
netconf
locate httpd.conf
cd /etc/.rpn
ls -al
wget
cd /var/www/cncmap/www/upload/renegade
ls -al
rm -rf phpshell.php
^__^
was this the exploited hole ?
I think so. In fact the problem is that it got there...
regards
Markus
15292 pid
kill 15292
netconf
locate httpd.conf
cd /etc/.rpn
ls -al
wget
cd /var/www/cncmap/www/upload/renegade
ls -al
rm -rf phpshell.php
^__^
was this the exploited hole ?
I think so. In fact the problem is that it got there...
regards
Markus
--
To UNSUBSCRIBE, email to [
Ralf Dreibrodt wrote:
Hi,
Markus Schabel wrote:
I've seen some strange things on my (stable with security-updates)
server: the last apt-get update didn't work because gzip segfaultet.
I've copied gzip from another server over the version on this server,
but it also crashed.
Laurent Corbes {Caf'} wrote:
On Wed, 17 Sep 2003 22:29:58 +0200
Markus Schabel <[EMAIL PROTECTED]> wrote:
I've seen some strange things on my (stable with security-updates)
server: the last apt-get update didn't work because gzip segfaultet.
I've copied gzip fr
Ralf Dreibrodt wrote:
Hi,
Markus Schabel wrote:
I've seen some strange things on my (stable with security-updates)
server: the last apt-get update didn't work because gzip segfaultet.
I've copied gzip from another server over the version on this server,
but it also crashed. Inter
Laurent Corbes {Caf'} wrote:
On Wed, 17 Sep 2003 22:29:58 +0200
Markus Schabel <[EMAIL PROTECTED]> wrote:
I've seen some strange things on my (stable with security-updates)
server: the last apt-get update didn't work because gzip segfaultet.
I've copied gzip from anoth
opped there and continued only after I
removed all processes in T state), then the same with inetd and after
that I gave up.
You think the server got hacked? Are there any other things that can
lead to this? man also behaves strange, it says either "No manual entry
for...", "What manual page do you want?" or nothing.
regards
Markus
ere and continued only after I
removed all processes in T state), then the same with inetd and after
that I gave up.
You think the server got hacked? Are there any other things that can
lead to this? man also behaves strange, it says either "No manual entry
for...", "What manual page d
On Saturday 24 May 2003 01:05, Herbert Xu wrote:
> Hi:
>
> If you're looking for Debian alpha/i386 kernel-images with all the
> recent security alerts (ptrace, ioperm, net hash) fixed, look no
> further.
[...]
Great,
thank you Herbert.
ch. http://www.grsecurity.net version 1.9.9h has
> the ptrace patch already in it, so it's the only patch you need for
> your kernel.
[...]
Ah, nice to know that grsecurity has a ptrace patch.
Thanks for all your answers.
They go round the problem to get an official flawless vanilla kernel,
but it seems there are no other possibilities at the moment.
Greets
Markus
On Sunday 18 May 2003 15:03, Florian Weimer wrote:
> Markus Kolb <[EMAIL PROTECTED]> writes:
> > where can I get information which patches I need for a secure, not
> > exploitable 2.4.20 vanilla kernel?
>
> What do you mean by "not exploitable"? What are
Hello,
where can I get information which patches I need for a secure, not
exploitable 2.4.20 vanilla kernel?
Is there a possibility without reading the kernel developer mailinglist?
Thx
On Wednesday 07 May 2003 14:53, Peter Holm wrote:
> Hi,
>
> may I be allowed to ask some questions?
>
> I am a little bit confused about the latest discussions on the ptrace
> kernel bug.
[...]
> Why isn´t there a security warning about that ptrace bug?
[...]
Well the most problem is that Marcelo
On Sat, 26 Apr 2003 16:30:23 +0200
Javier Fernández-Sanguino Peña <[EMAIL PROTECTED]> wrote:
Hi!
> > lsof +L1 prints every unlinked open file:
> (..)
>
> you can use a check from the Tiger security tool to do
> just this, it's called 'check_finddeleted' and will point you to the
> processes (nor
Hi!
As I described in a mail to debian-devel [1], it seems that with library
updates programs using the libraries are generally not restarted.
Nevertheless, for programs/services to use the updated libraries a
restart would be necessary.
Especially with security-updates for such central libraries
Brian McGroarty wrote:
This sure seems kind of silly... why add all these things into Big
Giant Namespace and not honor all of the conventions of the same? I
think /proc/* not supporting chmod changes for the duration of a
system's uptime could be classified as a bug or a major design
flaw. :/
Maurizio Lemmo - Tannoiser wrote:
On sabato 12 aprile 2003, alle 16:48, Markus Kolb wrote:
Nono, that's not what I'm asking... My question is, literally, _why_
doesn't woody have such a patch? (I applied it on my systems, I'm just
wondering why there isn't an official
Birzan George Cristian wrote:
On Sat, Apr 12, 2003 at 10:52:47AM +0200, Maurizio Lemmo - Tannoiser wrote:
On sabato 12 aprile 2003, alle 06:45, Birzan George Cristian wrote:
This might be a stupid question, I know, but, why isn't there a patch
for the ptrace exploit, for the Woody kernel-sour
On Fri, Apr 04, 2003 at 05:01:07PM +0200, Miek Gieben wrote:
> I'm trying to install the updated sendmail packages that fix the latest
> security hole. But after the installation I get this: see below.
> 8.12.3-6.2. didn't work
Same here, with the same error-messages.
Markus
On Fri, Apr 04, 2003 at 05:01:07PM +0200, Miek Gieben wrote:
> I'm trying to install the updated sendmail packages that fix the latest
> security hole. But after the installation I get this: see below.
> 8.12.3-6.2. didn't work
Same here, with the same error-message
Jon wrote:
[...]
Linux kmod + ptrace local root exploit by <[EMAIL PROTECTED]>
=> Simple mode, executing /usr/bin/id > /dev/tty
sizeof(shellcode)=95
=> Child process started..
=> Child process started..
[...]
Does this mean the patch I downloaded worked?
Yes.
- Jon
M
Jon wrote:
[...]
Linux kmod + ptrace local root exploit by <[EMAIL PROTECTED]>
=> Simple mode, executing /usr/bin/id > /dev/tty
sizeof(shellcode)=95
=> Child process started..
=> Child process started..
[...]
Does this mean the patch I downloaded worked?
Yes.
- Jon
Mmh, well,
me helpful javascript or cgi-sites which calculate the numbers above.
regards
--
\\\ ||| /// _\=/_
( @ @ )(o o)
+oOOo-(_)-oOOo------oOOo-(_)-oOOo--+
| Markus Schabel TGM - Die S
ascript or cgi-sites which calculate the numbers above.
regards
--
\\\ ||| /// _\=/_
( @ @ )(o o)
+oOOo-(_)-oOOo------oOOo-(_)-oOOo--+
| Markus Schabel TGM - Die Schule de
Well I think it's just annoying, keeping us away from mails really related to
Debian security. If you would like to discuss, why not simply create a forum and
invite everybody to post there ...
Don't you think it's quite enough and we should concentrate on the TOPIC this
list was created for?
Well I think it's just annoying, keeping us away from mails really related to
Debian security. If you would like to discuss, why not simply create a forum and
invite everybody to post there ...
Don't you think it's quite enough and we should concentrate on the TOPIC this
list was created for?
On Thu, Nov 07, 2002 at 08:57:26AM -0600, Hanasaki JiJi wrote:
> Anything security related that would cause wtmp to be zero'ed out?
Maybe it was just rotated by logrotate.
Check if wtmp.1 exists.
Greets
Markus
On Thu, Nov 07, 2002 at 08:57:26AM -0600, Hanasaki JiJi wrote:
> Anything security related that would cause wtmp to be zero'ed out?
Maybe it was just rotated by logrotate.
Check if wtmp.1 exists.
Greets
Markus
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of &quo
8078/junkbuster
But I have configured junkbuster to listen only to my network:
deny 0.0.0.0/0
permit 192.168.42.0/24
What do I understand wrong here ? TIA !
--
Markus Grunwald
Registered Linux User Nr 101577 http://www.grunwald.2xs.de
http://counter.li.org(hier pgp/gpg
To my knowledge you can safely ignore it. I'm always purging
the package on every server installation I did since I know
my servers don't use rpc at all.
- Markus
On Wed, Jul 31, 2002 at 08:46:38AM +0200, Jens Hafner wrote :
> some of you suggested to remove por
olves it.
Afaik klogd get's uninstalled with sysklogd when you install
syslog-ng.
- Markus
On Wed, Jul 24, 2002 at 01:23:41PM -0400, Desai, Jason wrote :
> Are you using syslog-ng? If so, when it gets restarted, klogd also needs to
> be restarted. Looks like there was a b
to use my "named" (i.e. they
never contact a malicious dns server), what is the inpact
them?
- Markus
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
- Original Message -
From: "Preben Randhol" <[EMAIL PROTECTED]>
To: "Laurent Luyckx" <[EMAIL PROTECTED]>
Cc: "Nemesis" <[EMAIL PROTECTED]>;
Sent: Saturday, February 02, 2002 1:16 PM
Subject: Re: Exim Relay
> Laurent Luyckx <[EMAIL PROTECTED]> wrote on 01/02/2002 (16:30) :
> > In exim.co
- Original Message -
From: "Preben Randhol" <[EMAIL PROTECTED]>
To: "Laurent Luyckx" <[EMAIL PROTECTED]>
Cc: "Nemesis" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Saturday, February 02, 2002 1:16 PM
Subject: Re: Exim Relay
> Laurent Luyckx <[EMAIL PROTECTED]> wrote on 01/02/2002 (16:
Am Mit, 14 Mär 2001 Josh Hattery:
> The system is a Celeron 300a (o/c 450, haven't had a problem in 2
> years) on an Abit BH6 motherboard.
Apperently You have one.
When I o/ced my Pentium 133 to 166 I had similar symptoms.
Markus
Am Mit, 14 Mär 2001 Josh Hattery:
> The system is a Celeron 300a (o/c 450, haven't had a problem in 2
> years) on an Abit BH6 motherboard.
Apperently You have one.
When I o/ced my Pentium 133 to 166 I had similar symptoms.
Markus
--
To UNSUBSCRIBE, email to [EMAIL PROTEC
check out Trend Micro's Inter Scan
it might fit your needs
Markus Seidel
2334 Vösendorf/NÖ, Eisgrubeng. 2-6/3 Stk.
Tel: 698-62-62 Fax: DW 99
mailto:[EMAIL PROTECTED]
http://www.network.
check out Trend Micro's Inter Scan
it might fit your needs
Markus Seidel
2334 Vösendorf/NÖ, Eisgrubeng. 2-6/3 Stk.
Tel: 698-62-62 Fax: DW 99
mailto:[EMAIL PROTECTED]
http://www.network.
73 matches
Mail list logo