Re: ptrace vulnerability?

2003-03-18 Thread Jason Rashaad Jackson
His announcement is Slashdotted, and I'm seeing no notice of which versions 
are affected!  I'm running 2.4.18 on all my Debian servers, please tell me 
what's going on.


--On Tuesday, March 18, 2003 12:04 PM +0100 Giacomo Mulas 
<[EMAIL PROTECTED]> wrote:



Alan Cox apparently just made public a vulnerability in the stock
kernel which would permit a local user to gain root privileges (see e.g.
Linux Today, LWN, the LK mailing list...). Is a patched source package in
the making already or should we humble users, in the meantime, take the
original patch and apply it, while the "official" thing gets worked out?

Bye
Giacomo

--
_

Giacomo Mulas <[EMAIL PROTECTED]>
_

OSSERVATORIO ASTRONOMICO DI CAGLIARI
Str. 54, Loc. Poggio dei Pini * 09012 Capoterra (CA)

Tel. (OAC): +39 070 71180 248 Fax : +39 070 71180 222
Tel. (UNICA): +39 070 675 4916
_

"When the storms are raging around you, stay right where you are"
 (Freddy Mercury)
_


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]





--
Jason Rashaad Jackson UNIX Systems Administrator
3556 Samuel T. Dana Building(W) 734.615.1422
Ann Arbor, MI 48109 (M) 734.649.6641
http://www.umich.edu/~jrashaad  (F) 734.763.8965



Re: ptrace vulnerability?

2003-03-18 Thread Jason Rashaad Jackson
His announcement is Slashdotted, and I'm seeing no notice of which versions 
are affected!  I'm running 2.4.18 on all my Debian servers, please tell me 
what's going on.

--On Tuesday, March 18, 2003 12:04 PM +0100 Giacomo Mulas 
<[EMAIL PROTECTED]> wrote:

Alan Cox apparently just made public a vulnerability in the stock
kernel which would permit a local user to gain root privileges (see e.g.
Linux Today, LWN, the LK mailing list...). Is a patched source package in
the making already or should we humble users, in the meantime, take the
original patch and apply it, while the "official" thing gets worked out?
Bye
Giacomo
--
_
Giacomo Mulas <[EMAIL PROTECTED]>
_
OSSERVATORIO ASTRONOMICO DI CAGLIARI
Str. 54, Loc. Poggio dei Pini * 09012 Capoterra (CA)
Tel. (OAC): +39 070 71180 248 Fax : +39 070 71180 222
Tel. (UNICA): +39 070 675 4916
_
"When the storms are raging around you, stay right where you are"
 (Freddy Mercury)
_
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]


--
Jason Rashaad Jackson UNIX Systems Administrator
3556 Samuel T. Dana Building(W) 734.615.1422
Ann Arbor, MI 48109 (M) 734.649.6641
http://www.umich.edu/~jrashaad  (F) 734.763.8965
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Apache, mod_auth_pam, pam_krb4, and you

2001-07-09 Thread Jason Rashaad Jackson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I'm going slowly insane trying to convince Apache to pass a user/pass to
pam_krb4, thereby validating a user for entrance into a secure directory.  Is
it too much to hope for that it's this simple?

Oh, yeah, my info:
Apache 1.3.19 compiled from source
/lib/security/pam_krb4.so
/usr/local/apache/libexec/mod_auth_pam.so

## From my httpd.conf

AuthPAM_Enabled on
AllowOverride None
AuthName "Secure Intranet"
AuthType "basic"
require group intranet


##  /etc/pam.d/httpd
auth   required   pam_krb4.so
accountrequired   pam_krb4.so

Any help would be much appreciated.  Muchly muchly.  Thanks!
- -- 
my card...
  ___
 |       |
 |    Jason Rashaad Jackson  |
 |       |
 | |\ /|  UNIX Systems Administrator |
 |  | |   2032 Dana Building |
 |  |  |\ /|  |   (Office) 734.615.1422  |
 |  |  | . |  |   (Mobile) 734.649.6641  |
 | |___|   |___|  http://www.umich.edu/~jrashaad |
 | G O   B L U E |
 |___|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7SdNa+LvK5VcniMsRAmE9AJ9Tl5PWofvDcTF0JPrBZYakGWTZ8QCfZ5q7
e7MUav2ITjUvKekhQrK1gOQ=
=ED/b
-END PGP SIGNATURE-



Apache, mod_auth_pam, pam_krb4, and you

2001-07-09 Thread Jason Rashaad Jackson

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I'm going slowly insane trying to convince Apache to pass a user/pass to
pam_krb4, thereby validating a user for entrance into a secure directory.  Is
it too much to hope for that it's this simple?

Oh, yeah, my info:
Apache 1.3.19 compiled from source
/lib/security/pam_krb4.so
/usr/local/apache/libexec/mod_auth_pam.so

## From my httpd.conf

AuthPAM_Enabled on
AllowOverride None
AuthName "Secure Intranet"
AuthType "basic"
require group intranet


##  /etc/pam.d/httpd
auth   required   pam_krb4.so
accountrequired   pam_krb4.so

Any help would be much appreciated.  Muchly muchly.  Thanks!
- -- 
my card...
  ___
 |       |
 |    Jason Rashaad Jackson  |
 |       |
 | |\ /|  UNIX Systems Administrator |
 |  | |   2032 Dana Building |
 |  |  |\ /|  |   (Office) 734.615.1422  |
 |  |  | . |  |   (Mobile) 734.649.6641  |
 | |___|   |___|  http://www.umich.edu/~jrashaad |
 | G O   B L U E |
 |___|
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7SdNa+LvK5VcniMsRAmE9AJ9Tl5PWofvDcTF0JPrBZYakGWTZ8QCfZ5q7
e7MUav2ITjUvKekhQrK1gOQ=
=ED/b
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]