[olug] Another round: Post your uptime!

Dan Linder dan at linder.org
Thu Aug 12 14:18:10 UTC 2010


Hmmm...  Google "linux kernel exploit 2.6.5-7.111" produces:

* Linux kernel sock_sendpage() denial of service vulnerability
 http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=37696

<http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=37696>*  Linux
kernel IP packet denial of service
    http://xforce.iss.net/xforce/xfdb/17800

Having a great up-time is a double-edged sword, but if it's not running
sendmail and it is well firewalled then it is probably not a major concern.
 Truly, anything with a connection to the outside world has
the possibility of being DOS'd or Root'ed.  But then that negates a
networked servers functionality.

Congrats on the uptime none the less!

Dan

On Thu, Aug 12, 2010 at 00:21, Brian Roberson <brian at bstc.net> wrote:

> <hidden>:/var/spool # uname -a
> Linux <hidden> 2.6.5-7.111-default #1 Wed Oct 13 15:45:13 UTC 2004 i686
> i686
> i386 GNU/Linux
> <hidden>:/var/spool # cat /etc/SuSE-release
> SuSE Linux 9.1 (i586)
> VERSION = 9.1
> <hidden>:/var/spool # uptime
>  12:17am  up 1480 days 19:09,  2 users,  load average: 0.45, 0.65, 0.38
> <hidden>:/var/spool #
>
>
>
>
> w00t!
> _______________________________________________
> OLUG mailing list
> OLUG at olug.org
> https://lists.olug.org/mailman/listinfo/olug
>



-- 
***************** ************* *********** ******* ***** *** **
"Quis custodiet ipsos custodes?"
    (Who can watch the watchmen?)
    -- from the Satires of Juvenal
"I do not fear computers, I fear the lack of them."
    -- Isaac Asimov (Author)
** *** ***** ******* *********** ************* *****************



More information about the OLUG mailing list