Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Jan Lühr
Greetings,.. Am Mittwoch, 14. April 2004 20:57 schrieben Sie: > Jan Lühr <[EMAIL PROTECTED]> writes: > > Greetings, > Okay... This is the result of a cursory check, do your homework, yada, > yada... > Thanks for doing so ;) Anyway, this wasn't the intetention of my

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread Jan Lühr
Greetings, Am Mittwoch, 14. April 2004 23:08 schrieb Phillip Hofmeister: > If you checked the reference CVE numbers you should be able to tell when > the exposure first occurred (or close to it). > Thanks :) - I have already been there. Are there any, no longer classified information about the fi

CAN-2003-0020?

2004-04-17 Thread Jan Lühr
Greetings, what about http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 ? Is debian finally going to fix it? keep smiling yanosz

Re: CAN-2003-0020?

2004-04-18 Thread Jan Lühr
Greetings, Am Sonntag, 18. April 2004 18:56 schrieb Matt Zimmerman: > On Sat, Apr 17, 2004 at 10:16:11PM +0200, Jan L??hr wrote: > > what about > > http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 ? Is > > debian finally going to fix it? > > Current consensus between the security te

Re: Question about Debian security policy

2005-06-30 Thread Jan Lühr
Greetings, Am Donnerstag, 30. Juni 2005 12:57 schrieb Paul Haesler: > > Hi everybody. I hope this question won't be too stupid. > > When I perform a standard installation (i.e minimal), the installer > > installs many servers, and launches them (like portmap, ssh, exim, > > etc). Why? I think that

Re: Debian Security Support in Place

2005-07-09 Thread Jan Lühr
(open letter to the debian security team) Greetings,.. on friday, 8th july 2005 07:58 Martin Schulze wrote: [...] > The Debian project confirms that the security infrastructure for both > the current release Debian GNU/Linux 3.1 (alias sarge) and the former > release 3.0 (alias woody) is working

Re: Timeliness of Debian Security Announceness? (DSA 756-1 Squirrelmail)

2005-07-14 Thread Jan Lühr
Greetings, Am Donnerstag, 14. Juli 2005 17:40 schrieb Herwig Wittmann: > Hi! > > I am trying to understand if my organization can rely on the debian > security announcement mailing list as only source of security alerts in > the future. > > This would be very convenient- but the delay that seems t

Re: [SECURITY] [DSA 3481-1] glibc security update

2016-02-17 Thread Jan Lühr
Hello folks, thanks for providing a patch in Debian. One question: Am 02/16/2016 um 03:18 PM schrieb Salvatore Bonaccorso: > CVE-2015-7547 > > The Google Security Team and Red Hat discovered that the glibc Comparing the age (2015-07) and the severity: Can you give some details on the situa

CVE-2016-1503 / Debian Bug 810621

2016-04-06 Thread Jan Lühr
Hello folks, Google patched CVE-2016-1503 in Android recently. Debian Bug #810621 is open since January 2016 - an upstream fix seems to be available since Tuesday (Debian BTS says so). Info: https://security-tracker.debian.org/tracker/CVE-2016-1503 Will there be a DSA? Thanks, Jan

CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem

2016-10-04 Thread Jan Lühr
Hello, CVE-2016-7117 was patched in Android today.I don't see much information right now. The title is rather frightening - the issue appears to be urgent. Can you confirm, that common Debian installation are unaffected and cannot be taken over via CVE-2016-7117? If not, I'd like to shut down a f

Re: CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem

2016-10-04 Thread Jan Lühr
Hello, Am 10/04/2016 um 07:57 PM schrieb Nicholas Luedtke: > On 10/04/2016 11:40 AM, Felix Knecht wrote: > >> On 10/04/2016 06:38 PM, Jan Lühr wrote: >>> CVE-2016-7117 was patched in Android today.I don't see much information >>> right now. The title is rather

Re: CVE-2016-7117 Remote code execution vulnerability in kernel networking subsystem

2016-10-05 Thread Jan Lühr
Hello, Am 10/05/2016 um 06:52 AM schrieb Salvatore Bonaccorso: > On Tue, Oct 04, 2016 at 11:54:12PM +0200, Jan Lühr wrote: >> Hello, >> Am 10/04/2016 um 07:57 PM schrieb Nicholas Luedtke: >>> On 10/04/2016 11:40 AM, Felix Knecht wrote: >>> >>>> On 1

Details on CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem

2017-04-03 Thread Jan Lühr
Hei folks, android recently patched CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem. Since https://security-tracker.debian.org/tracker/CVE-2016-10229 is rather blank ... does this problem exists in debian, too? Thanks, Jan -- There's a ripped off cord To my TV

Re: Details on CVE-2016-10229: Remote code execution vulnerability in kernel networking subsystem

2017-04-04 Thread Jan Lühr
Hello, Am 04/04/2017 um 08:11 AM schrieb Salvatore Bonaccorso: > Hi > > On Tue, Apr 04, 2017 at 12:52:41AM +0200, Jan Lühr wrote: >> Hei folks, >> >> android recently patched CVE-2016-10229: Remote code execution >> vulnerability in kernel networking subsys

Infrastructer back online?

2004-01-07 Thread Jan Lühr
Greetings, noticing the increasing amount of secure-adv I'd like to ask, wheter the buid-deamons are back or wheter another issue is increasing the amount of advs rapidly. Keep smiling yanosz

[OT] Re: Infrastructer back online?

2004-01-10 Thread Jan Lühr
Greetings, On Sat, Januar 10 2004 at 04:22 Matt Zimmerman wrote: > On Sat, Jan 10, 2004 at 03:22:15AM +, Nick Boyce wrote: > > On Wed, 7 Jan 2004 19:43:02 -0800, Matt Zimmerman wrote: > > >On Thu, Jan 08, 2004 at 04:08:23AM +0100, Martin Helas wrote: > > >> Am Mi Jan 07, 2004 at 06:5432 -0800

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-18 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Mittwoch, 18. Februar 2004 19:06 schrieb Steve Kemp: > On Wed, Feb 18, 2004 at 11:59:06PM +0700, Jean Christophe ANDR? wrote: > > Does any body could tell me why the /boot/vmlinuz-2.4.18-1-686 > > from kernel-image-2.4.18-1-686 version 2

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-18 Thread Jan Lühr
Greetings, Am Mittwoch, 18. Februar 2004 21:31 schrieb Otavio Salvador: > Florian Weimer <[EMAIL PROTECTED]> writes: > > Jan Lühr wrote: > >> Does this mean, that a well known exploit was kept back for nearly three > >> weeks, just because some odd vendors w

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-18 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, > > > >> Does this mean, that a well known exploit was kept back for nearly > > > >> three weeks, just because some odd vendors were unable to build > > > >> there kernels in time? > > > > > > > > Yes, this is the norm. Debian hides secur

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-18 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Mittwoch, 18. Februar 2004 22:47 schrieb Michael Stone: > On Wed, Feb 18, 2004 at 10:36:35PM +0100, Jan Lühr wrote: > >Well, of course you might have quite good reasons for doing so, but for > > me, this is quite a

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings,. Am Donnerstag, 19. Februar 2004 00:37 schrieb Michael Stone: > On Wed, Feb 18, 2004 at 11:37:19PM +0100, Jan Lühr wrote: > >But if knowlegde about this vuln is availeable - if fixes are done, but > > not avaible yet, how do I protect myself? > > Are you l

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings, Am Donnerstag, 19. Februar 2004 09:39 schrieb Jean Christophe ANDRÉ: > Le jeudi 19 février 2004 à 09h24 (+0100), Jan Lühr écrivait : > > What about establishing some kind of warning service? E.g. sshd has a > > well known serious leak, you should shut it down for th

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings,. Am Donnerstag, 19. Februar 2004 14:22 schrieben Sie: > Jan Lühr wrote: > > Well, of course you might have quite good reasons for doing so, but for > > me, this is quite a good reason for changing the distri or os. > > But to what? Currently, you have two choi

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings, Am Donnerstag, 19. Februar 2004 14:24 schrieben Sie: > Jan Lühr wrote: > > But if knowlegde about this vuln is availeable - if fixes are done, but > > not avaible yet, how do I protect myself? > > You don't. Tough luck, of course, but that's the price fo

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings, Am Donnerstag, 19. Februar 2004 14:28 schrieben Sie: > Jan Lühr wrote: > > But the dominance of the CERT is excactly the point I'm criticising. > > CERT/CC is no longer dominant. Many people now disclose their findings > to other coordinators and get paid for t

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings,. Am Donnerstag, 19. Februar 2004 05:05 schrieb Bernd S. Brentrup: > On Wed, Feb 18, 2004 at 04:44:15PM -0500, Michael Stone wrote: > > On Wed, Feb 18, 2004 at 09:17:13PM +0100, Florian Weimer wrote: > > >Yes, this is the norm. Debian hides security bugs from its users for > > >extended

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greeting,. Am Donnerstag, 19. Februar 2004 15:12 schrieb Florian Weimer: > Jan Lühr wrote: > > > You don't. Tough luck, of course, but that's the price for running > > > affordable, off-the-shelf software (free or proprietary). > > > > well, th

output of last

2004-02-21 Thread Jan Lühr
Greetings, I discovered some strange output of the last command on our Woody Terminalserver (for X11). I have already posted it on debian-user-german, but I didn't get any answer. (I hope you don't mind, if I post it for the english speaking majority) Although I hope it is not security related,

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-21 Thread Jan Lühr
Greetings, Am Samstag, 21. Februar 2004 01:10 schrieb Matt Zimmerman: .. > CERT rarely has anything to do with coordinating disclosure, and there is > no need to bring them into this discussion at all. The coordination that > happens is between vendors, like Debian, as peers. > > Those last two

Re: output of last

2004-02-21 Thread Jan Lühr
Greetings,... Am Samstag, 21. Februar 2004 17:11 schrieb s. keeling: > Incoming from Jan Lühr: > > Greetings, > > > > I discovered some strange output of the last command on our Woody > > Terminalserver (for X11). I have already posted it on debian-user-german, > >

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-22 Thread Jan Lühr
Greetings, Am Sonntag, 22. Februar 2004 10:09 schrieb Jim Richardson: > On Sat, 21 Feb 2004 22:20:05 +0100, > > Matt Zimmerman <[EMAIL PROTECTED]> wrote: > > On Sat, Feb 21, 2004 at 11:09:09AM +0100, Jan L?hr wrote: > >> Am Samstag, 21. Februar 2004 01:10 schrieb Matt Zimmerman: > >> .. > >> > >>

Tripwire (clone) which would you prefer?

2004-02-23 Thread Jan Lühr
Greetings, well, I looking for an open source intrusion detection. At first, tripwire caputures my attention, but the last open source version seems to be three years old - is it still in development or badly vulnerable? Then I searched for tripwire in the woody packages and found integrit and

Re: Fwd: Re: [ox-en] Walther

2004-02-25 Thread Jan Lühr
Greetings, > or is good code more important than this sort of stuff? What's the alternativ? Call the CIA or ths Spanish christian inquisition to check everybodies political correctness? Keep smiling yanosz

mozilla - the forgotten package?

2004-03-09 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, over the last months, various security related bugs in mozilla appeared and were fixed in new versions of mozilla - but what about the debian package? Are there any efforts for making mozilla secure or to backport the mozilla patches to

Re: mozilla - the forgotten package?

2004-03-09 Thread Jan Lühr
Greetings, Am Dienstag, 9. März 2004 17:20 schrieb Steve Kemp: > On Tue, Mar 09, 2004 at 05:15:42PM +0100, Jan L??hr wrote: > > over the last months, various security related bugs in mozilla appeared > > and were fixed in new versions of mozilla - but what about the debian > > package? Are there a

Re: mozilla - the forgotten package?

2004-03-09 Thread Jan Lühr
Greetings, Am Dienstag, 9. März 2004 20:54 schrieb Noah Meyerhans: > On Tue, Mar 09, 2004 at 08:53:23PM +0100, Jan L?hr wrote: > > So this is all in all a capacity problem? Doesn't have the debian > > security team enough ressource to port exisiting patches to debian > > packages? Why not enlargin

Re: mozilla - the forgotten package?

2004-03-10 Thread Jan Lühr
Greetings, Am Mittwoch, 10. März 2004 17:06 schrieben Sie: > Jan Lühr wrote: > > So is mozilla the forgotten package? Considering how popular mozilla is, > > making it secure would be worth the effort - imho. > > How many of Mozilla's security bugs which are fix dur

Re: mozilla - the forgotten package?

2004-03-11 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Mittwoch, 10. März 2004 22:39 schrieb Florian Weimer: > Sven Hoexter wrote: > > > Okay, if that's the case, I'm going to start a campaign for including > > > Mozilla 1.4 (plus fixes) in stable. > > > > Well why just include 1.4 and not 1

Re: mozilla - the forgotten package?

2004-03-11 Thread Jan Lühr
Greetings, Am Donnerstag, 11. März 2004 19:22 schrieb Phillip Hofmeister: > On Thu, 11 Mar 2004 at 12:24:15PM -0500, Matt Zimmerman wrote: > > This introduces a whole new set of problems, given Mozilla's upgrade > > history (not preserving user configuration data, breaking compatibility > > with d

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Montag, 22. März 2004 19:30 schrieb Sven Hoexter: > On Mon, Mar 22, 2004 at 06:57:39PM +0100, Giacomo Mulas wrote: > > There is a \begin{sarcasm} nice \end{sarcasm} article in > > linuxworld Australia (see > > http://www.linuxworld.c

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings,... Am Montag, 22. März 2004 21:05 schrieb Matt Zimmerman: > On Mon, Mar 22, 2004 at 08:57:26PM +0100, Jan L?hr wrote: > > Cron is another example > > Cron is another example of what? By all means, please elaborate. Of a package of the dis

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Montag, 22. März 2004 21:16 schrieb Bryan Allen: > On Mar 22, 2004, at 2:57 PM, Jan Lühr wrote: > > Cron is another example - the be honest, the debian security team > > seems to be > > crippled by the debian releas

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Montag, 22. März 2004 21:52 schrieb Ramon Kagan: > Every so often another set of tirades goes across this list. So I wish > only to give my 2 cents. > > 1. If you don't like the way debian conducts it's FREE business, my > opinion is g

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Montag, 22. März 2004 21:20 schrieb Nathan Eric Norman: > On Mon, Mar 22, 2004 at 10:01:14PM +0100, Jan Lühr wrote: > > Greetings, > > > > Am Montag, 22. März 2004 21:16 schrieb Bryan Allen: > > > On Mar

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Jan Lühr
Greetings, Am Mittwoch, 14. April 2004 16:52 schrieb Martin Schulze: > -- > Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Martin Schulze

Infrastructer back online?

2004-01-07 Thread Jan Lühr
Greetings, noticing the increasing amount of secure-adv I'd like to ask, wheter the buid-deamons are back or wheter another issue is increasing the amount of advs rapidly. Keep smiling yanosz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMA

[OT] Re: Infrastructer back online?

2004-01-10 Thread Jan Lühr
Greetings, On Sat, Januar 10 2004 at 04:22 Matt Zimmerman wrote: > On Sat, Jan 10, 2004 at 03:22:15AM +, Nick Boyce wrote: > > On Wed, 7 Jan 2004 19:43:02 -0800, Matt Zimmerman wrote: > > >On Thu, Jan 08, 2004 at 04:08:23AM +0100, Martin Helas wrote: > > >> Am Mi Jan 07, 2004 at 06:5432 -0800

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-18 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Mittwoch, 18. Februar 2004 19:06 schrieb Steve Kemp: > On Wed, Feb 18, 2004 at 11:59:06PM +0700, Jean Christophe ANDR? wrote: > > Does any body could tell me why the /boot/vmlinuz-2.4.18-1-686 > > from kernel-image-2.4.18-1-686 version 2

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-18 Thread Jan Lühr
Greetings, Am Mittwoch, 18. Februar 2004 21:31 schrieb Otavio Salvador: > Florian Weimer <[EMAIL PROTECTED]> writes: > > Jan Lühr wrote: > >> Does this mean, that a well known exploit was kept back for nearly three > >> weeks, just because some odd vendors w

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-18 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, > > > >> Does this mean, that a well known exploit was kept back for nearly > > > >> three weeks, just because some odd vendors were unable to build > > > >> there kernels in time? > > > > > > > > Yes, this is the norm. Debian hides secur

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-18 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Mittwoch, 18. Februar 2004 22:47 schrieb Michael Stone: > On Wed, Feb 18, 2004 at 10:36:35PM +0100, Jan Lühr wrote: > >Well, of course you might have quite good reasons for doing so, but for > > me, this is quite a

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings,. Am Donnerstag, 19. Februar 2004 00:37 schrieb Michael Stone: > On Wed, Feb 18, 2004 at 11:37:19PM +0100, Jan Lühr wrote: > >But if knowlegde about this vuln is availeable - if fixes are done, but > > not avaible yet, how do I protect myself? > > Are you l

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings, Am Donnerstag, 19. Februar 2004 09:39 schrieb Jean Christophe ANDRÃ: > Le jeudi 19 fÃvrier 2004 Ã 09h24 (+0100), Jan LÃhr Ãcrivait : > > What about establishing some kind of warning service? E.g. sshd has a > > well known serious leak, you should shut it down for the next few days. > >

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings,. Am Donnerstag, 19. Februar 2004 14:22 schrieben Sie: > Jan Lühr wrote: > > Well, of course you might have quite good reasons for doing so, but for > > me, this is quite a good reason for changing the distri or os. > > But to what? Currently, you have two choi

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings, Am Donnerstag, 19. Februar 2004 14:24 schrieben Sie: > Jan Lühr wrote: > > But if knowlegde about this vuln is availeable - if fixes are done, but > > not avaible yet, how do I protect myself? > > You don't. Tough luck, of course, but that's the price fo

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings, Am Donnerstag, 19. Februar 2004 14:28 schrieben Sie: > Jan Lühr wrote: > > But the dominance of the CERT is excactly the point I'm criticising. > > CERT/CC is no longer dominant. Many people now disclose their findings > to other coordinators and get paid for t

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greetings,. Am Donnerstag, 19. Februar 2004 05:05 schrieb Bernd S. Brentrup: > On Wed, Feb 18, 2004 at 04:44:15PM -0500, Michael Stone wrote: > > On Wed, Feb 18, 2004 at 09:17:13PM +0100, Florian Weimer wrote: > > >Yes, this is the norm. Debian hides security bugs from its users for > > >extended

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-19 Thread Jan Lühr
Greeting,. Am Donnerstag, 19. Februar 2004 15:12 schrieb Florian Weimer: > Jan Lühr wrote: > > > You don't. Tough luck, of course, but that's the price for running > > > affordable, off-the-shelf software (free or proprietary). > > > > well, th

output of last

2004-02-21 Thread Jan Lühr
Greetings, I discovered some strange output of the last command on our Woody Terminalserver (for X11). I have already posted it on debian-user-german, but I didn't get any answer. (I hope you don't mind, if I post it for the english speaking majority) Although I hope it is not security related,

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-21 Thread Jan Lühr
Greetings, Am Samstag, 21. Februar 2004 01:10 schrieb Matt Zimmerman: .. > CERT rarely has anything to do with coordinating disclosure, and there is > no need to bring them into this discussion at all. The coordination that > happens is between vendors, like Debian, as peers. > > Those last two

Re: output of last

2004-02-21 Thread Jan Lühr
Greetings,... Am Samstag, 21. Februar 2004 17:11 schrieb s. keeling: > Incoming from Jan Lühr: > > Greetings, > > > > I discovered some strange output of the last command on our Woody > > Terminalserver (for X11). I have already posted it on debian-user-german, > >

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-22 Thread Jan Lühr
Greetings, Am Sonntag, 22. Februar 2004 10:09 schrieb Jim Richardson: > On Sat, 21 Feb 2004 22:20:05 +0100, > > Matt Zimmerman <[EMAIL PROTECTED]> wrote: > > On Sat, Feb 21, 2004 at 11:09:09AM +0100, Jan L?hr wrote: > >> Am Samstag, 21. Februar 2004 01:10 schrieb Matt Zimmerman: > >> .. > >> > >>

Tripwire (clone) which would you prefer?

2004-02-23 Thread Jan Lühr
Greetings, well, I looking for an open source intrusion detection. At first, tripwire caputures my attention, but the last open source version seems to be three years old - is it still in development or badly vulnerable? Then I searched for tripwire in the woody packages and found integrit and

Re: Fwd: Re: [ox-en] Walther

2004-02-25 Thread Jan Lühr
Greetings, > or is good code more important than this sort of stuff? What's the alternativ? Call the CIA or ths Spanish christian inquisition to check everybodies political correctness? Keep smiling yanosz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble

mozilla - the forgotten package?

2004-03-09 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, over the last months, various security related bugs in mozilla appeared and were fixed in new versions of mozilla - but what about the debian package? Are there any efforts for making mozilla secure or to backport the mozilla patches to

Re: mozilla - the forgotten package?

2004-03-09 Thread Jan Lühr
Greetings, Am Dienstag, 9. März 2004 17:20 schrieb Steve Kemp: > On Tue, Mar 09, 2004 at 05:15:42PM +0100, Jan L??hr wrote: > > over the last months, various security related bugs in mozilla appeared > > and were fixed in new versions of mozilla - but what about the debian > > package? Are there a

Re: mozilla - the forgotten package?

2004-03-09 Thread Jan Lühr
Greetings, Am Dienstag, 9. März 2004 20:54 schrieb Noah Meyerhans: > On Tue, Mar 09, 2004 at 08:53:23PM +0100, Jan L?hr wrote: > > So this is all in all a capacity problem? Doesn't have the debian > > security team enough ressource to port exisiting patches to debian > > packages? Why not enlargin

Re: mozilla - the forgotten package?

2004-03-10 Thread Jan Lühr
Greetings, Am Mittwoch, 10. März 2004 17:06 schrieben Sie: > Jan Lühr wrote: > > So is mozilla the forgotten package? Considering how popular mozilla is, > > making it secure would be worth the effort - imho. > > How many of Mozilla's security bugs which are fix dur

Re: mozilla - the forgotten package?

2004-03-11 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Mittwoch, 10. März 2004 22:39 schrieb Florian Weimer: > Sven Hoexter wrote: > > > Okay, if that's the case, I'm going to start a campaign for including > > > Mozilla 1.4 (plus fixes) in stable. > > > > Well why just include 1.4 and not 1

Re: mozilla - the forgotten package?

2004-03-11 Thread Jan Lühr
Greetings, Am Donnerstag, 11. März 2004 19:22 schrieb Phillip Hofmeister: > On Thu, 11 Mar 2004 at 12:24:15PM -0500, Matt Zimmerman wrote: > > This introduces a whole new set of problems, given Mozilla's upgrade > > history (not preserving user configuration data, breaking compatibility > > with d

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Montag, 22. März 2004 19:30 schrieb Sven Hoexter: > On Mon, Mar 22, 2004 at 06:57:39PM +0100, Giacomo Mulas wrote: > > There is a \begin{sarcasm} nice \end{sarcasm} article in > > linuxworld Australia (see > > http://www.linuxworld.c

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings,... Am Montag, 22. März 2004 21:05 schrieb Matt Zimmerman: > On Mon, Mar 22, 2004 at 08:57:26PM +0100, Jan L?hr wrote: > > Cron is another example > > Cron is another example of what? By all means, please elaborate. Of a package of the dis

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Montag, 22. März 2004 21:16 schrieb Bryan Allen: > On Mar 22, 2004, at 2:57 PM, Jan Lühr wrote: > > Cron is another example - the be honest, the debian security team > > seems to be > > crippled by the debian releas

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Montag, 22. März 2004 21:52 schrieb Ramon Kagan: > Every so often another set of tirades goes across this list. So I wish > only to give my 2 cents. > > 1. If you don't like the way debian conducts it's FREE business, my > opinion is g

Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Jan Lühr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Am Montag, 22. März 2004 21:20 schrieb Nathan Eric Norman: > On Mon, Mar 22, 2004 at 10:01:14PM +0100, Jan Lühr wrote: > > Greetings, > > > > Am Montag, 22. März 2004 21:16 schrieb Bryan Allen: > > > On Mar

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Jan Lühr
Greetings, Am Mittwoch, 14. April 2004 16:52 schrieb Martin Schulze: > -- > Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Martin Schulze

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Jan Lühr
Greetings,.. Am Mittwoch, 14. April 2004 20:57 schrieben Sie: > Jan Lühr <[EMAIL PROTECTED]> writes: > > Greetings, > Okay... This is the result of a cursory check, do your homework, yada, > yada... > Thanks for doing so ;) Anyway, this wasn't the intetention of my

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread Jan Lühr
Greetings, Am Mittwoch, 14. April 2004 23:08 schrieb Phillip Hofmeister: > If you checked the reference CVE numbers you should be able to tell when > the exposure first occurred (or close to it). > Thanks :) - I have already been there. Are there any, no longer classified information about the fi

CAN-2003-0020?

2004-04-17 Thread Jan Lühr
Greetings, what about http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 ? Is debian finally going to fix it? keep smiling yanosz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: CAN-2003-0020?

2004-04-18 Thread Jan Lühr
Greetings, Am Sonntag, 18. April 2004 18:56 schrieb Matt Zimmerman: > On Sat, Apr 17, 2004 at 10:16:11PM +0200, Jan L??hr wrote: > > what about > > http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 ? Is > > debian finally going to fix it? > > Current consensus between the security te

Security issue? Daemon users has to much rights...

2004-10-22 Thread Jan Lühr
Greetings, because of the recent xpdf issues I tested the access restrictions of some users like lp, mail, etc. with default settings in sarge. I noticed that, by default, no acl were used to prevent access to vital system commands, the user shouldn't have. For instance: lp could mount a vfat p

Re: Security issue? Daemon users has to much rights...

2004-10-22 Thread Jan Lühr
Greetings, Am Freitag, 22. Oktober 2004 14:02 schrieb Daniel Pittman: > On 22 Oct 2004, Jan LÃhr wrote: > > because of the recent xpdf issues I tested the access restrictions of > > some users like lp, mail, etc. with default settings in sarge. I noticed > > that, by default, no acl were used to p

Re: Security issue? Daemon users has to much rights...

2004-10-24 Thread Jan Lühr
Greetings,... Am Samstag, 23. Oktober 2004 05:58 schrieb Daniel Pittman: > On 23 Oct 2004, Jan LÃhr wrote: > > Am Freitag, 22. Oktober 2004 14:02 schrieb Daniel Pittman: > >> On 22 Oct 2004, Jan LÃhr wrote: > Yes, and that is one of the core points in my suggestion that you look > at SELinux or a

Fwd: dhcp-2 Security Announcement

2004-11-09 Thread Jan Lühr
Greetings, just asking, cause it is relevant for me: Will there be new official stable packages in the next few days (3-4)? (If not, I've to patch it by myself) Keep smiling yanosz --- Begin Message --- *** From dhcp-announce -- To unsubscribe, see the end of this message. *** Debian has recen

CAN-2005-0001, CAN-2004-1235, CAN-2004-1137, CAN-2004-1016, Georgi Guninski security advisory #72, 2004, grsecurity 2.1.0 release

2005-01-12 Thread Jan Lühr
Greetings, things seem to be in a rush right now, and I'm looking for a little overview. In the past 1-2 months several kernel exploits rushed through the news that might / can / probably will affect debian stable. However, I haven't seen any signle DSA regarding the following issues: Can you pl

Re: CAN-2005-0001, CAN-2004-1235, CAN-2004-1137, CAN-2004-1016, Georgi Guninski security advisory #72, 2004, grsecurity 2.1.0 release

2005-01-12 Thread Jan Lühr
Greetings, Am Mittwoch, 12. Januar 2005 18:27 schrieb Sam Morris: > Jan LÃhr wrote: > > Greetings, > > > > things seem to be in a rush right now, and I'm looking for a little > > overview. In the past 1-2 months several kernel exploits rushed through > > the news that might / can / probably will a

Re: woody kernel image

2005-01-29 Thread Jan Lühr
Greetings, Am Freitag, 28. Januar 2005 21:25 schrieb Harald Krammer: > hi ! > > I have running some debian/woody machines with kernel 2.4.18. > > @:~$ cat /proc/version > Linux version 2.4.18-1-k7 ([EMAIL PROTECTED]) (gcc version 2.95.4 20011002 > (Debian prerelease)) #1 Wed Apr 14 19:20:42 UTC 20

Re: [Fwd: security]

2005-01-29 Thread Jan Lühr
Greetings,... Am Samstag, 29. Januar 2005 16:05 schrieb michael: > On debian-user it was suggested I also post this here, thanks, Michael > Forwarded Message > From: michael <[EMAIL PROTECTED]> > To: debian user > Subject: security > Date: Fri, 28 Jan 2005 09:46:31 + > I not

Re: [OT] tales (was: woody kernel image)

2005-01-30 Thread Jan Lühr
Greetings, Am Sonntag, 30. Januar 2005 21:14 schrieb Alexander Schmehl: > Hi! > > * Michelle Konzack <[EMAIL PROTECTED]> [050130 20:29]: > > > how does it come, that every time, you're telling such a story and are > > > requested for some proof, one of your services is down, you cite > > > complet

Re: Grsecurity patches on Debian

2005-02-07 Thread Jan Lühr
Greetings,.. Am Montag, 7. Februar 2005 14:10 schrieb Andras Got: > Hi, > > You should start with grsec low and proc restricions set customly. > Hardening your kernel is always a option. The grsec default high settings, > and PaX break Jetty (java server container) in two, so it simply won't > sta

Re: Kernel security advice

2005-02-18 Thread Jan Lühr
Greetings, Am Freitag, 18. Februar 2005 04:51 schrieb JM: > Hello, > > * Besides grsecurity patch, pax etc...What other recommendations are there > to patch a kernel on a woody or sarge production server? > > * Any experiences/opinions with the debian-hardened kernels? > > * Is it that terrible ru

Well - and kernel 2.4.18?

2005-04-03 Thread Jan Lühr
Greetings, is there any progress in providing fixed kernels for stable? I was just wondering 'cause I expected 'em three months ago. Keep smiling yanosz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Well - and kernel 2.4.18?

2005-04-03 Thread Jan Lühr
Greetings, Am Sonntag 03 April 2005 22:57 schrieb Harald Krammer: > Hi Jan, > I had the same question but this is a while ago. At the moment I use > kernel 2.4.27 from backport.org. > > Here is the link from the old thread: > http://lists.debian.org/debian-security/2005/01/threads.html#00201 Me,

Re: Well - and kernel 2.4.18?

2005-04-03 Thread Jan Lühr
Greetings, Am Sonntag 03 April 2005 23:16 schrieb Jan LÃhr: > Greetings, > > Am Sonntag 03 April 2005 22:57 schrieb Harald Krammer: > > Hi Jan, > > I had the same question but this is a while ago. At the moment I use > > kernel 2.4.27 from backport.org. > > > > Here is the link from the old threa

Re: Security Support by the Security-Team

2005-06-17 Thread Jan Lühr
Greetings, Am Freitag, 17. Juni 2005 10:58 schrieb Florian Weimer: > Rumors suggest that the technical foundations of security support for > sarge and woody are working again. Nice to hear - however, a SpamAssassin-patch has to be ported to sarge.[1] Let's see... the Sec-Announce was posted ~2 d

Re: Security Support by the Security-Team

2005-06-19 Thread Jan Lühr
Greetings, Am Samstag, 18. Juni 2005 09:04 schrieb Helmut Toplitzer: > Hi! > > Just a few remarks: > > << Use unstable or testing, and apply security fixes yourself. Over > > To my opinion this is a bad suggestion. Maybe my last mail was a bit > unclear about this. As security is a process rather

Re: SpamAssassin DOS-Fix anytime soon ?

2005-06-23 Thread Jan Lühr
Greetings,.. Am Donnerstag, 23. Juni 2005 13:42 schrieb [EMAIL PROTECTED]: > Hi list, > > a remote-dos-vulnerability in spamassassin 3.0.1-3.0.3 was announced a > week ago. while most other distributions have since then reacted on this > a debian stable security fix seems still unavailable. on t

Re: SpamAssassin DOS-Fix anytime soon ?

2005-06-25 Thread Jan Lühr
Greetings,... Am Freitag, 24. Juni 2005 15:58 schrieb Marek Olejniczak: > On Fri, 24 Jun 2005, Nicolas [iso-8859-1] François wrote: > > On Thu, Jun 23, 2005 at 03:52:14PM +0200, Marek Olejniczak wrote: > >> There is also a bug in su package which is since 6 days not fixed. > >> Hallo, security tea

Re: Bad press related to (missing) Debian security

2005-06-27 Thread Jan Lühr
Greetings, Am Montag, 27. Juni 2005 15:54 schrieb Carl-Eric Menzel: > On Mon, 27 Jun 2005 15:50:19 +0200, "Jan Wagner" <[EMAIL PROTECTED]> said: > > On Monday 27 June 2005 15:25, W. Borgert wrote: > > > Just FYI: The well-known German Heise Newsticker (IT related) has an > > > article today with t

Re: Bad press related to (missing) Debian security

2005-06-27 Thread Jan Lühr
Greetings, Am Montag, 27. Juni 2005 20:10 schrieb Adam Majer: > Jan Lühr wrote: > >Greetings, > > > >Am Montag, 27. Juni 2005 15:54 schrieb Carl-Eric Menzel: > >>Does anybody know what the actual problem is, i.e. why there are no > >>updates? > > >

  1   2   >