[Gllug] [Fwd: SSH Security Advisory: Centos (and other distros)]

Jon Fautley jfautley at redhat.com
Wed Jul 8 15:41:40 UTC 2009


On Wed, 08 Jul 2009 16:36:17 +0100
Harry Rickards <hrickards at l33tmyst.com> wrote:

> It's not a 'random' person, they're my VPS host. It looks as though it
> might by the zero day 0pen0wn exploit.

Well, it's good that you've confirmed it was them that sent it. I take
it you'll be verifying the origins of the packages before you install
them, too? :)

Oh, and I'm still not aware that anyone's confirmed the existence of
the fabled "0pen0wn" exploit, have they?

Cheers,

Jon
-- 
Jon Fautley RHCE, RHCDS, RHCX, RHCA  email: jfautley at redhat.com
Senior Consultant                    cell :     +44 7841 558683
Global Professional Services
Red Hat UK, 200 Fowler Avenue, Farnborough, Hampshire, GU14 7JP
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 205 bytes
Desc: not available
URL: <http://mailman.lug.org.uk/pipermail/gllug/attachments/20090708/c93d036a/attachment.pgp>
-------------- next part --------------
-- 
Gllug mailing list  -  Gllug at gllug.org.uk
http://lists.gllug.org.uk/mailman/listinfo/gllug


More information about the GLLUG mailing list