Linux-Bulgaria.ORG
навигация

 

начало

пощенски списък

архив на групата

семинари ...

документи

как да ...

 

 

Предишно писмо Следващо писмо Предишно по тема Следващо по тема По Дата По тема (thread)

Re: lug-bg: OpenSSH vulnerable


  • Subject: Re: lug-bg: OpenSSH vulnerable
  • From: f4zs08mm34sph8c001@xxxxxxxxxxxxxx (JHS@xxxxxxxxxxxxx)
  • Date: Tue, 25 Jun 2002 19:39:15 +0900



On Tue, Jun 25, 2002 at 12:55:14PM +0300, Vasil Kolev vasil@xxxxxxxxxxx XXXXXXXXXXXXXX wrote:
|
|
|On Tue, 25 Jun 2002, JHS@xxxxxxxxxxxxx wrote:
|
|>
|> Åòî êàêâî ïèøàò â Debian IRC êàíàëà:
|> "Theo de Raadt has claimed that ssh 3.0 has a serious remote-root
|> exploit, but refuses to reveal what it is.  Theo recommends upgrading to
|> 3.3 which makes this exploit less serious, however 3.3 doesn't work with
|> 2.2 kernels, has problems with PAM on some setups, the compression
|> doesn't work and someone at FreeBSD claims there is a different
|> remote-root exploit in it."
|
|Malko poveche informaciq? kakvo znachi che ne raboti na 2.2. kerneli, az
|toku-shto update-nah edna mashina s 2.2.19  s debianskiq ssh, i nqmam
|problemi da se logvam...

Åòî êàêâî êàçâàò: 
"2.2 doesn't have anonymous mmaps"

Àêî èñêàø ïîâå÷å èíôî, âëåç â #debian-devel íà irc.debian.org è èìàé
ïðåäâèä, ÷å íàðîäà å â íåðâíî-ïàðàíîè÷íî íàñòðîåíèå. >:-(

--JS

============================================================================
A mail-list of Linux Users Group - Bulgaria (bulgarian linuxers).
http://www.linux-bulgaria.org - Hosted by Internet Group Ltd. - Stara Zagora
To unsubscribe: http://www.linux-bulgaria.org/public/mail_list.html
============================================================================



 

наши приятели

 

линукс за българи
http://linux-bg.org

FSA-BG
http://fsa-bg.org

OpenFest
http://openfest.org

FreeBSD BG
http://bg-freebsd.org

KDE-BG
http://kde.fsa-bg.org/

Gnome-BG
http://gnome.cult.bg/

проект OpenFMI
http://openfmi.net

NetField Forum
http://netField.ludost.net/forum/

 

 

Linux-Bulgaria.ORG

Mailing list messages are © Copyright their authors.