Re: Debian DSA-5095-1 : linux - security update

2022-03-18 Thread Thorsten Glaser
>"apt-get upgrade” doesn’t upgrade the linux-headers to the latest >fixed version You need “apt-get upgrade --with-new-pkgs” at the very least to keep a stable system up-to-date. I use “apt-get --purge dist-upgrade” myself while keeping an eye on what packages apt wants to remove with that. bye,

Re: Debian DSA-5095-1 : linux - security update

2022-03-17 Thread Cindy Sue Causey
On 3/17/22, Peter Wienemann wrote: > > You can check its status using > > dpkg -l linux-headers-amd64 That has interesting feedback. I've been using the following for a slightly different trek toward a similar end (includes what mine says right now): $ apt-cache policy linux-headers-amd64 linux

Re: Debian DSA-5095-1 : linux - security update

2022-03-17 Thread Peter Wienemann
Hi Sona, On 17.03.22 15:02, Sona Das wrote: But whenever I tried to upgrade my linux-header it still remains on linux-headers-5.10.0-10 version, it doesn’t gets upgraded to the latest one. have you verified that the metapackage linux-headers-amd64 is installed on your system - as suggested by

Re: Debian DSA-5095-1 : linux - security update

2022-03-17 Thread Greg Wooledge
On Thu, Mar 17, 2022 at 07:32:27PM +0530, Sona Das wrote: > But whenever I tried to upgrade my linux-header it still remains on > linux-headers-5.10.0-10 version, it doesn’t gets upgraded to the latest one. > > As per the below url the security vulnerability for Debian 11 is resolved in > versio

Re: Debian DSA-5095-1 : linux - security update

2022-03-17 Thread Sona Das
.org/debian-security bullseye-security main contrib > On 17-Mar-2022, at 5:38 AM, Ben Hutchings wrote: > > On Wed, 2022-03-16 at 23:46 +0530, Sona Das wrote: >> Hi Team, >> >> We are having High level threat in our Debian systems detected by our >> vulnerability scann

Re: Debian DSA-5095-1 : linux - security update

2022-03-16 Thread Ben Hutchings
On Wed, 2022-03-16 at 23:46 +0530, Sona Das wrote: > Hi Team, > > We are having High level threat in our Debian systems detected by our > vulnerability scanners > Debian DSA-5095-1 : linux - security update > > Debian DSA-4994-1 : bind9 - security update > > We

Re: Debian DSA-5095-1 : linux - security update

2022-03-16 Thread Andrew M.A. Cater
On Wed, Mar 16, 2022 at 11:46:02PM +0530, Sona Das wrote: > Hi Team, > > We are having High level threat in our Debian systems detected by our > vulnerability scanners > Debian DSA-5095-1 : linux - security update > > Debian DSA-4994-1 : bind9 - security update > &

Re: Debian DSA-5095-1 : linux - security update

2022-03-16 Thread piorunz
On 16/03/2022 18:16, Sona Das wrote: Hi Team, We are having High level threat in our Debian systems detected by our vulnerability scanners Debian DSA-5095-1 : linux - security update Debian DSA-4994-1 : bind9 - security update We tried to upgrade our Debian systems using

Debian DSA-5095-1 : linux - security update

2022-03-16 Thread Sona Das
Hi Team, We are having High level threat in our Debian systems detected by our vulnerability scanners Debian DSA-5095-1 : linux - security update Debian DSA-4994-1 : bind9 - security update We tried to upgrade our Debian systems using the Debian repo but the affected packages didn’t received

Linux security vs. foo (was Re: recommended Virus Scanner?)

2003-11-28 Thread Karsten M. Self
on Thu, Nov 27, 2003 at 06:57:18AM -0800, Tom ([EMAIL PROTECTED]) wrote: > On Thu, Nov 27, 2003 at 05:39:05AM -0800, Karsten M. Self wrote: > > Thanks for the excellent answers. > > > ...you don't need to worry about viruses for GNU/Linux. > > >GNU/Linux has a security profile. It's general

mountd exploit info ( from [linux-security] The poisoned NUL byte] )

1998-10-14 Thread m*
-- -- Please refer to the information about this list as well as general information about Linux security at http://www.aoy.com/Linux/Security. -- To unsubscribe: mail -s unsubscribe [EMAIL PROTECTED] < /dev/null --- End Message ---

Re: Linux security

1998-08-30 Thread C.J.LAWSON
Have you asked the ISP how many /etc/passwds (s)he has broken ... After if, maybe, probably ... you can say anything. Talk as they say this side of the Atlantic is CHEAP On Tue, 18 Aug 1998 [EMAIL PROTECTED] wrote: > I was having a discussion with my ISP about Linux. He said he uses > Windows N

Re: Linux security

1998-08-19 Thread Michele Bini
On Wed, 19 Aug 1998, Steve Lamb wrote: > On Wed, 19 Aug 1998 13:21:37 -0500, the lone gunman wrote: > > >only to the Microsoft programmers. In my mind, it just seems that the > >more folks there are looking at code, the better the chances of > >discovering bugs, security concerns, etc. > >

Re: Linux security

1998-08-19 Thread the lone gunman
On Wed, Aug 19, 1998 at 11:42:25AM -0700, Steve Lamb wrote: > On Wed, 19 Aug 1998 13:21:37 -0500, the lone gunman wrote: > > >only to the Microsoft programmers. In my mind, it just seems that the > >more folks there are looking at code, the better the chances of > >discovering bugs, security conc

Re: Linux security

1998-08-19 Thread Steve Lamb
On Wed, 19 Aug 1998 13:21:37 -0500, the lone gunman wrote: >only to the Microsoft programmers. In my mind, it just seems that the >more folks there are looking at code, the better the chances of >discovering bugs, security concerns, etc. It is the glass half empty versus the glass half full

Re: Linux security

1998-08-19 Thread the lone gunman
On Tue, Aug 18, 1998 at 11:46:43AM -0500, [EMAIL PROTECTED] wrote: > I was having a discussion with my ISP about Linux. He said he uses > Windows NT because it is much more secure than Linux. He stated > that since the source code was available that it was very unsecure. I have trouble with this

Re: Linux security

1998-08-19 Thread Richard E. Hawkins Esq.
Stephen wrote, > At work we have a setup like this...it "requires" that you "log in" > to even use the computer. > If you hit cancel (or esc) it denies acess...but... > hit alt-esc and presto > the login screen is still there but the task manager comes up... > then you merrily goto "file->run"

Re: Passwd Encryption (Re: Linux security)

1998-08-19 Thread Nathan E Norman
On Wed, 19 Aug 1998, Chris wrote: : On Tue, 18 Aug 1998, Steve Lamb wrote: : : > On Tue, 18 Aug 1998 23:27:40 -0500 (CDT), Nathan E Norman wrote: : > : > >No. The first two characters of the "Encrypted password" field are the : > >"salt"; the plaintext password collected from loogin or wh

Passwd Encryption (Re: Linux security)

1998-08-19 Thread Chris
On Tue, 18 Aug 1998, Steve Lamb wrote: > On Tue, 18 Aug 1998 23:27:40 -0500 (CDT), Nathan E Norman wrote: > > >No. The first two characters of the "Encrypted password" field are the > >"salt"; the plaintext password collected from loogin or wherever is > >crypted using that salt, and the result

Re: Linux security

1998-08-19 Thread Steve Lamb
On Tue, 18 Aug 1998 23:27:40 -0500 (CDT), Nathan E Norman wrote: >No. The first two characters of the "Encrypted password" field are the >"salt"; the plaintext password collected from loogin or wherever is >crypted using that salt, and the result compared to the entire field. Hrm, guess thin

Re: Linux security

1998-08-19 Thread Nathan E Norman
On Tue, 18 Aug 1998, Steve Lamb wrote: : On Tue, Aug 18, 1998 at 09:43:13PM -0500, Nathan E Norman wrote: : > However, let's assume someone grabs a copy of your /etc/passwd file, and : > you aren't using shadow passwords. All is not lost (yet). See, you : > can't decrypt the information stor

Re: Linux security

1998-08-19 Thread Stephen J. Carpenter
On Tue, Aug 18, 1998 at 11:22:37PM +, George R wrote: > On 08/18/98 at 11:13 PM, [EMAIL PROTECTED] said: > > On Tue, 18 Aug 1998, George R wrote: > > >> I know you are talking about NT vs Linux; but does anyone know how well > >> Win95 password protection works? It doesn't the morons made th

Re: Linux security

1998-08-19 Thread Kent West
At 11:22 PM 8/18/1998 +, you wrote: >On 08/18/98 at 11:13 PM, [EMAIL PROTECTED] said: > >On Tue, 18 Aug 1998, George R wrote: > >>> I know you are talking about NT vs Linux; but does anyone know how well >>> Win95 password protection works? It doesn't the morons made the default >>> configurat

Re: Linux security

1998-08-19 Thread Steve Lamb
On Tue, Aug 18, 1998 at 09:43:13PM -0500, Nathan E Norman wrote: > However, let's assume someone grabs a copy of your /etc/passwd file, and > you aren't using shadow passwords. All is not lost (yet). See, you > can't decrypt the information stored on disk - your plaintext password > is encrypted

Re: Linux security

1998-08-19 Thread George R
On 08/18/98 at 11:13 PM, [EMAIL PROTECTED] said: On Tue, 18 Aug 1998, George R wrote: >> I know you are talking about NT vs Linux; but does anyone know how well >> Win95 password protection works? It doesn't the morons made the default >> configuration one where all the invader has to do is hit

Re: Linux security

1998-08-19 Thread detre
In my experiance the only thing that happens when you press escape at the login screen is some machines on the network won't be visable/accesable On Tue, 18 Aug 1998, George R wrote: > On 08/18/98 at 11:46 AM, [EMAIL PROTECTED] said: > > >I was having a discussion with my ISP about Linux. He sa

Re: Linux security

1998-08-19 Thread George R
On 08/18/98 at 11:46 AM, [EMAIL PROTECTED] said: >I was having a discussion with my ISP about Linux. He said he uses >Windows NT because it is much more secure than Linux. He stated that >since the source code was available that it was very unsecure. He >mentioned something about attaining root

Re: Linux security

1998-08-19 Thread Stephen J. Carpenter
On Tue, Aug 18, 1998 at 11:46:43AM -0500, [EMAIL PROTECTED] wrote: > I was having a discussion with my ISP about Linux. He said he uses > Windows NT because it is much more secure than Linux. He stated that > since the source code was available that it was very unsecure. He mentioned > someth

Re: Linux security

1998-08-19 Thread Nathan E Norman
On Tue, 18 Aug 1998 [EMAIL PROTECTED] wrote: : I was having a discussion with my ISP about Linux. He said he uses : Windows NT because it is much more secure than Linux. He stated that : since the source code was available that it was very unsecure. He : mentioned something about attaining

Re: Linux security

1998-08-19 Thread Jason Gunthorpe
On Tue, 18 Aug 1998 [EMAIL PROTECTED] wrote: > I was having a discussion with my ISP about Linux. He said he uses > Windows NT because it is much more secure than Linux. He stated that > since the source code was available that it was very unsecure. He This is known as 'security through obscu

Re: Linux security

1998-08-19 Thread Sergey Imennov
>I was having a discussion with my ISP about Linux. He said he uses Windows NT >because it is much more secure than Linux. He stated that since the source >code was available that it was very unsecure. He mentioned something about That is apparently a VERY wrong statement. Just because the so

Re: Linux security

1998-08-19 Thread Kyle Amon
-BEGIN PGP SIGNED MESSAGE- Clearly, you were speaking with a Junior Level individual. Call back and ask for Second Level Support next time. :-) - - Kyle On Tue, 18 Aug 1998 [EMAIL PROTECTED] wrote: > I was having a discussion with my ISP about Linux. He said he uses > Windows NT becau

Linux security

1998-08-19 Thread randyh
I was having a discussion with my ISP about Linux. He said he uses Windows NT because it is much more secure than Linux. He stated that since the source code was available that it was very unsecure. He mentioned something about attaining root access by downloading /etc/passwd and de-crypting

Re: Bill Wohler: Linux security tips

1998-07-27 Thread A. M. Varon
On Mon, 27 Jul 1998, Bill Wohler wrote: > In a recent Usenix login; magazine, an article on security noted the > following configurations for Linux. I noticed that most are already > in place in my 2.0.33 kernel (I haven't upgraded to hamm yet, but > soon!) > > I couldn't find mention

Re: Bill Wohler: Linux security tips

1998-07-27 Thread fantomas
-> To prevent Linux from forwarding any packets, recompile the kernel -> with the option CONFIG_IP_FORWARD off. who does compile linux with packet forwarding on when he des not want it to be a router ? -> To prevent responding to pings altogether, use -> CONFIG_IP_IGNORE_ECHO_REQUESTS on.

Bill Wohler: Linux security tips

1998-07-27 Thread Bill Wohler
anywhere. Has this already been folded into the kernel? If not, perhaps it should be considered. --- Forwarded Message To: [EMAIL PROTECTED] Subject: Linux security tips From:Bill Wohler <[EMAIL PROTECTED]> Date:Tue, 02 Jun 1998 07:57:36 -0700 To prevent Linux fro

Re: [linux-security] Re: Chrooting bind 8.1.2 under debian 2.0

1998-07-17 Thread Cougar
On Fri, 17 Jul 1998, Carlos Barros wrote: > On Fri, 17 Jul 1998, Cougar wrote: > > > > try changing only the line that start the bind daemon eg: > > > > > > chroot /chroot-dns/ /bin/named > > > > What this chroot gives You? Actually this is protection against simple > > exec("/bin/s

Re: [linux-security] Re: Chrooting bind 8.1.2 under debian 2.0

1998-07-17 Thread Carlos Barros
On Fri, 17 Jul 1998, Cougar wrote: > > try changing only the line that start the bind daemon eg: > > > > chroot /chroot-dns/ /bin/named > > What this chroot gives You? Actually this is protection against simple > exec("/bin/sh") but every cracker may put chroot("/") before this and a

Re: [linux-security] Re: Chrooting bind 8.1.2 under debian 2.0

1998-07-17 Thread seifried
>On Tue, 14 Jul 1998, Carlos Barros wrote: > >> On Tue, 14 Jul 1998, cfb wrote: >> >> > The main problem seems to be with the way that debian starts bind using >> > the script /etc/init.d/bind. I thought it would be really neat to just >> > change the #!/bin/sh at the top of the script to so

Re: [linux-security] Re: Chrooting bind 8.1.2 under debian 2.0

1998-07-17 Thread Jon Lewis
On Fri, 17 Jul 1998, Cougar wrote: > [mod: It is slightly less trivial than 'chroot("/")', but if you can > execute arbitrary code as root, you can break out of the chrooted > environment. --REW] > > My idea is to run named non-root UID/GID. As named needs to bind port 53 > which is below 1024 th

Re: [linux-security] Re: Chrooting bind 8.1.2 under debian 2.0

1998-07-17 Thread Filipe Jorge Marques de Almeida
On Fri, Jul 17, 1998 at 11:30:32AM +0300, Cougar wrote: > What this chroot gives You? Actually this is protection against simple > exec("/bin/sh") but every cracker may put chroot("/") before this and all > the protection is destroyed. > > [mod: It is slightly less trivial than 'chroot("/")', but

Re: [linux-security] Re: Chrooting bind 8.1.2 under debian 2.0

1998-07-17 Thread Wolfgang Ley
-BEGIN PGP SIGNED MESSAGE- Cougar wrote: > > On Tue, 14 Jul 1998, Carlos Barros wrote: > > > On Tue, 14 Jul 1998, cfb wrote: > > > > > The main problem seems to be with the way that debian starts bind using > > > the script /etc/init.d/bind. I thought it would be really neat to just >

Re: [linux-security] Re: Chrooting bind 8.1.2 under debian 2.0

1998-07-17 Thread Leigh Porter
Carlos Barros wrote: > On Tue, 14 Jul 1998, cfb wrote: > > > The main problem seems to be with the way that debian starts bind using > > the script /etc/init.d/bind. I thought it would be really neat to just > > change the #!/bin/sh at the top of the script to something like : > >#!/u

Re: [linux-security] Re: Chrooting bind 8.1.2 under debian 2.0

1998-07-17 Thread Cougar
On Tue, 14 Jul 1998, Carlos Barros wrote: > On Tue, 14 Jul 1998, cfb wrote: > > > The main problem seems to be with the way that debian starts bind using > > the script /etc/init.d/bind. I thought it would be really neat to just > > change the #!/bin/sh at the top of the script to somethin

Re: WC:>: [linux-security] Perl script to locate F0 0F C7 C8 bombs (fwd)

1997-11-10 Thread ychim
http://desertwinds.multipleimage.com/ > -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- > > -- Forwarded message -- > Date: Mon, 10 Nov 1997 11:41:17 + (MYT) > To: linuxsa <[EMAIL PROTECTED]> > Subject: [linux-security] Perl script to locate F0 0F

WC:>: [linux-security] Perl script to locate F0 0F C7 C8 bombs (fwd)

1997-11-10 Thread Chad D. Zimmerman
) To: linuxsa <[EMAIL PROTECTED]> Subject: [linux-security] Perl script to locate F0 0F C7 C8 bombs (fwd) There is no known fix to the F0 0F C7 C8 bug at this time. What can be done, however, is run a program, such as the script after my signature, to locate any and all such programs.

Re: [linux-security] i386-elf-xquake-1.01.tgz (fwd)

1997-02-25 Thread Joey Hess
Stefan Petters: > just found this on linux--security. > > Seems to be contained in your tar--files for Debian as well. I don't > want such things on my machines. I think, this Package can't be on a > serious Debian--Distribution. I know, you can't keep an eye on &g

Linux Security Hole in in mount/umount (fwd)

1996-08-16 Thread Steffen Mueller
Hi there's some information I got from CERT this morning ! - -BEGIN PGP SIGNED MESSAGE- __ The U.S. Department of Energy Computer Incident Advisory Capability