[Gllug] [Fwd: SSH Security Advisory: Centos (and other distros)]
Jon Fautley
jfautley at redhat.com
Wed Jul 8 15:41:40 UTC 2009
On Wed, 08 Jul 2009 16:36:17 +0100
Harry Rickards <hrickards at l33tmyst.com> wrote:
> It's not a 'random' person, they're my VPS host. It looks as though it
> might by the zero day 0pen0wn exploit.
Well, it's good that you've confirmed it was them that sent it. I take
it you'll be verifying the origins of the packages before you install
them, too? :)
Oh, and I'm still not aware that anyone's confirmed the existence of
the fabled "0pen0wn" exploit, have they?
Cheers,
Jon
--
Jon Fautley RHCE, RHCDS, RHCX, RHCA email: jfautley at redhat.com
Senior Consultant cell : +44 7841 558683
Global Professional Services
Red Hat UK, 200 Fowler Avenue, Farnborough, Hampshire, GU14 7JP
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 205 bytes
Desc: not available
URL: <http://mailman.lug.org.uk/pipermail/gllug/attachments/20090708/c93d036a/attachment.pgp>
-------------- next part --------------
--
Gllug mailing list - Gllug at gllug.org.uk
http://lists.gllug.org.uk/mailman/listinfo/gllug
More information about the GLLUG
mailing list