server uptime
Warren Luebkeman
warren at resara.com
Thu Mar 20 13:48:14 EDT 2008
Nah, we are not vulnerable to that exploit. We do keep tabs on important security issues when they come up. We plan to retire that server pretty soon, although I may leave it running behind the firewall, just to see how long it goes... ;-)
----- Original Message -----
From: "Bill McGonigle" <bill at bfccomputing.com>
To: "Warren Luebkeman" <warren at resara.com>, "Benjamin Scott" <dragonhawk at gmail.com>
Cc: "Greater NH Linux User Group" <gnhlug-discuss at mail.gnhlug.org>
Sent: Thursday, March 20, 2008 1:41:25 PM (GMT-0500) America/New_York
Subject: Re: server uptime
On Mar 19, 2008, at 15:36, Ben Scott wrote:
> You're obviously not installing all your security updates, then.
> Both the 2.4 and 2.6 Debian kernels have had security advisories
> posted within the past two years.
Hey, it's possible that Warren's kernel is so old that he doesn't
suffer from the vmslice() exploit. :)
Seriously, though - check. If `uname -r` >= 2.6.17, vmsplice() plus
one (e.g.) PHP bug = remote root exploit. That's bad, mmmkay?
Perhaps more importantly you're not picking up ext3 bugfixes, the CQF
elevator, etc.
And somebody around here actually found an old Netware box running in
a closet that had been drywalled over 5 years before. It was
apparently still serving files and print jobs (they traced the
ethernet cable).
-Bill
-----
Bill McGonigle, Owner Work: 603.448.4440
BFC Computing, LLC Home: 603.448.1668
bill at bfccomputing.com Cell: 603.252.2606
http://www.bfccomputing.com/ Page: 603.442.1833
Blog: http://blog.bfccomputing.com/
VCard: http://bfccomputing.com/vcard/bill.vcf
--
Warren Luebkeman
Founder, COO
Resara LLC
888.357.9195
www.resara.com
More information about the gnhlug-discuss
mailing list