Re: MIT discovered issue with gcc

2013-11-23 Thread Michael Tautschnig
Hi Andrew, hi all, I understand that Debian has a bunch of vulnerabilities as described in the following PDF. http://pdos.csail.mit.edu/~xi/papers/stack-sosp13.pdf Just a small quote: This paper presents the first systematic approach for reasoning about and detecting unstable code. We

Re: MIT discovered issue with gcc

2013-11-23 Thread Michael Tautschnig
[...] Isn't it interesting that their one example will potentially dereference the null pointer even before compiler optimizations (from the paper): struct tun_struct *tun=; struct sock *sk = tun-sk; if(*tun) return POLLERR; The check to see that tun is non-null should occur before

Re: Fwsnort: --hex-string syntax bug

2011-07-29 Thread Michael Tautschnig
Hi, I've been trying to file a bug report trough the bug report tool of Debian. But without a succes. So I'll just inform you all about this bug since I do want to inform you about it. I'm sorry this isn't the proper method, but bugreport isn't cooperative with my SMTP for some reason.

Re: ClamAV update to 0.97 for Lenny (oldstable)

2011-03-15 Thread Michael Tautschnig
Hi all, On Sat, Mar 12, 2011 at 08:11:27AM -0800, tabris wrote: On 2/25/11 6:56 AM, CamaleĆ³n wrote: I just have read this notice: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1003 And wonder if it is foreseen an update for Lenny's ClamAV to 0.97 that has fixed

Re: jedit_4.3.1+dfsg-1_amd64.changes REJECTED

2010-04-05 Thread Michael Tautschnig
[...] I would proceed in this way: bsh: add bsh-src binary creation jedit: - remove Debian bsh sources (added to the rejected package [2]) - add bsh-src as builddep I think if you do a versioned builddep (exact version) then at the very latest an archive rebuild will ensure that jedit

Re: jedit_4.3.1+dfsg-1_amd64.changes REJECTED

2010-04-03 Thread Michael Tautschnig
* Gabriele Giacone: For example openjdk-6-source: source code is in both orig tarball and openjdk-6-source binary package. This is a duplication, isn't it? First, the duplication refers to source packages. Second, openjdk-6-source is like the emacs*-el packages, it provides IDE

Re: clamav 0.95.3+dfsg-1~volatile1 and rar files

2009-12-06 Thread Michael Tautschnig
Hi ! The latest clamav 0.95.3+dfsg-1 from volatile knows howto scan rar files natively ? The --unrar option doesn't work anymore and the EICAR is not detected: #clamscan --scan-archive=yes --verbose --unrar=/usr/bin/unrar eicar.rar WARNING: Ignoring deprecated option --unrar [...] You

Re: [Secure-testing-team] Security support for volatile?

2009-03-13 Thread Michael Tautschnig
This one time, at band camp, Michael Stone said: On Mon, Feb 23, 2009 at 07:27:14PM +0100, Kurt Roeckx wrote: I think one the reason why clamav is in volatile is that the engine might need updating to detect new viruses. Is that something you want to support in stable-security? I

Re: Scalable Debian vulnerability tracking

2009-01-06 Thread Michael Tautschnig
Hi folks, I work for an hosting provider, and am looking at how to improve visibility into vulnerability exposure. We have over 800 Debian hosts that we manage fore customers, and will have over 1,000 by the end of this quarter. A major problem we face is that our change

Re: [SECURITY] [DSA 1680-1] New clamav packages fix potential codeexecution

2008-12-10 Thread Michael Tautschnig
On Wed, Dec 10, 2008 at 13:21, Dominic Hargreaves [EMAIL PROTECTED] wrote: I don't really understand your question. There is no separate security archive for volatile, as I understand it. Oddly enough I understood Tony, yet I don't understand the Volative+ClamAV situation. Can someone

Re: [SECURITY] [DSA 1680-1] New clamav packages fix potential code execution

2008-12-05 Thread Michael Tautschnig
[...] This looks like quite a serious bug (remote arbitrary code execution). Are there any plans for an update to volatile? The fixed version has been uploaded to volatile already and got accepted [1], but probably is still being built!? Best, Michael [1]

What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
Hi all, since two days (approx.) I'm seeing an extremely high number of apparently coordinated (well, at least they are trying the same list of usernames) brute force attempts from IP addresses spread all over the world. I've got denyhosts and an additional iptables based firewall solution in

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
On Thu, Aug 21, 2008 at 04:33:51PM +0200, Michael Tautschnig wrote: Further, what do you guys do about such attacks? Just sit back and hope they don't get hold of any passwords? Any ideas are welcome... Port knocking is a useful technique I've employed several times on boxes where it's

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
Hi, * use a Firewall to prevent other IP address to connect to your ssh service. restrict just to yours (iptables script can be easy to find on the web) Well, I should have added that my hosts must be world-wide accessible using password-based authentication, so this is no option. * use

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
Assuming that your system is secured as well as can be, and that your question is not about how to fend off attacks but rather how to stop your attackers from being able to continue, isn't this the kind of thing that the police or other law enforcement agencies would normally investigate?

Re: What to do about SSH brute force attempts?

2008-08-21 Thread Michael Tautschnig
* Michael Tautschnig [EMAIL PROTECTED] [2008-08-21 07:35-0400]: Hi all, since two days (approx.) I'm seeing an extremely high number of apparently coordinated (well, at least they are trying the same list of usernames) brute force attempts from IP addresses spread all over the world

Re: [SECURITY] [DSA 1353-1] New tcpdump packages fix arbitrary code execution

2007-08-11 Thread Michael Tautschnig
I'm out of office until the 19th of August. Afterwards, I will try to respond to your message as soon as possible. Best regards, Michael Tautschnig -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]