Re: 2.2.18 exploit, and updating the kernel
Frodo Baggins wrote: On Sun, Mar 17, 2002 at 01:59:47PM +0100, vdongen scripsit: If I'm not out of line on this, I would suggest getting netinstall. potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso woody: http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso most machines nowadays have cdrom players. Would you know if these CD includes a pppoe thing? Tha is, I have an ADSL connection, so I would like to use it to install. 10q Yep it does, rp-ppoe-1.01 i think. Have a lot of fun !
Re: 2.2.18 exploit, and updating the kernel
Frodo Baggins wrote: On Sun, Mar 17, 2002 at 01:59:47PM +0100, vdongen scripsit: If I'm not out of line on this, I would suggest getting netinstall. potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso woody: http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso most machines nowadays have cdrom players. Would you know if these CD includes a pppoe thing? Tha is, I have an ADSL connection, so I would like to use it to install. 10q Yep it does, rp-ppoe-1.01 i think. Have a lot of fun ! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: 2.2.18 exploit, and updating the kernel
On Sun, Mar 17, 2002 at 01:59:47PM +0100, vdongen scripsit: If I'm not out of line on this, I would suggest getting netinstall. potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso woody: http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso most machines nowadays have cdrom players. Would you know if these CD includes a pppoe thing? Tha is, I have an ADSL connection, so I would like to use it to install. 10q -- Leo TheHobbit IRCnet #roma2 ICQ 56656060 -BEGIN GEEK CODE BLOCK- Version: 3.12 GED/CS d? s-:++ a+ C++ UL+++ P E+ W++ N+ o K? !w O? M V PS+++ PE-- Y+ PPG+ t++ 5? X-- R+ tv+ b+++ DI? D G++ e*() h r++ y+++(*) --END GEEK CODE BLOCK-- ++ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: 2.2.18 exploit, and updating the kernel
On Sun, Mar 17, 2002 at 01:59:47PM +0100, vdongen scripsit: If I'm not out of line on this, I would suggest getting netinstall. potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso woody: http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso most machines nowadays have cdrom players. Would you know if these CD includes a pppoe thing? Tha is, I have an ADSL connection, so I would like to use it to install. 10q -- Leo TheHobbit IRCnet #roma2 ICQ 56656060 -BEGIN GEEK CODE BLOCK- Version: 3.12 GED/CS d? s-:++ a+ C++ UL+++ P E+ W++ N+ o K? !w O? M V PS+++ PE-- Y+ PPG+ t++ 5? X-- R+ tv+ b+++ DI? D G++ e*() h r++ y+++(*) --END GEEK CODE BLOCK-- ++
Re: 2.2.18 exploit, and updating the kernel
On Fri, Mar 15, 2002 at 06:16:22PM -0500, [EMAIL PROTECTED] wrote: I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box on my network and used this exploit to gain root: http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1 The other boxes that are net accessible are openbsd -- This system is a dual p6 so I need debian for smp. Is there a proper 'debian' way to go about patching the kernel against this exploit, or updating the kernel to 2.4. I think make-kpkg might be what you're looking for. It creates a deb from the kernel sources. -- David Hart [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: 2.2.18 exploit, and updating the kernel
On Sun, 17 Mar 2002 13:59:47 +0100 vdongen [EMAIL PROTECTED] wrote: most machines nowadays have cdrom players. Heh, true! I guess somewhere I got in the habit of downloading the floppies to install rather than .isos. I think at the time I only had one CDROM and 5 machines and I got really tired of swapping it every time I needed a fresh install. Either way's viable and it's good to have a multitude of skills. As long as someone's able to get deb installed (and running), I'd consider it a victory :) regards Brad Beck - Linux guru in beta -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: 2.2.18 exploit, and updating the kernel
On Fri, Mar 15, 2002 at 06:16:22PM -0500, [EMAIL PROTECTED] wrote: I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box on my network and used this exploit to gain root: http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1 The other boxes that are net accessible are openbsd -- This system is a dual p6 so I need debian for smp. Is there a proper 'debian' way to go about patching the kernel against this exploit, or updating the kernel to 2.4. I think make-kpkg might be what you're looking for. It creates a deb from the kernel sources. -- David Hart [EMAIL PROTECTED]
Re: 2.2.18 exploit, and updating the kernel
That's the proper 'debian' way to do it. But if you've already been rooted you'll probably want to start from a fresh install. Download the install floppy images from http://ftp.us.debian.org/debian/dists/woody/main/disks-i386/current/i mages-1.44/ jikes, how oldfashion. If I'm not out of line on this, I would suggest getting netinstall. potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso woody: http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso most machines nowadays have cdrom players. Greetz, Ivo
Re: 2.2.18 exploit, and updating the kernel
On Sun, 17 Mar 2002 13:59:47 +0100 vdongen [EMAIL PROTECTED] wrote: most machines nowadays have cdrom players. Heh, true! I guess somewhere I got in the habit of downloading the floppies to install rather than .isos. I think at the time I only had one CDROM and 5 machines and I got really tired of swapping it every time I needed a fresh install. Either way's viable and it's good to have a multitude of skills. As long as someone's able to get deb installed (and running), I'd consider it a victory :) regards Brad Beck - Linux guru in beta
Re: 2.2.18 exploit, and updating the kernel
On Fri, Mar 15, 2002 at 06:16:22PM -0500, [EMAIL PROTECTED] wrote: I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box on my network and used this exploit to gain root: http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1 The other boxes that are net accessible are openbsd -- This system is a dual p6 so I need debian for smp. Is there a proper 'debian' way to go about patching the kernel against this exploit, or updating the kernel to 2.4. 2.2.18 is deprecated. Use the latest one (2.2.19) in potato. It's rock solid (some security patches were backported in it). -- Francesco P. Lovergine
2.2.18 exploit, and updating the kernel
I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box on my network and used this exploit to gain root: http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1 The other boxes that are net accessible are openbsd -- This system is a dual p6 so I need debian for smp. Is there a proper 'debian' way to go about patching the kernel against this exploit, or updating the kernel to 2.4. Thanks, David Rolfe @ work -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: 2.2.18 exploit, and updating the kernel
On Fri, 15 Mar 2002 18:16:22 EST [EMAIL PROTECTED] wrote: I get: Could not connect to remote server when I try to follow that link. I get: The address is not available from this machine when I strip out the extra leading : :) I am curious as to seeing what potato is vulnerable to. However: if you want the 2.4.* kernel on your deb box, you should upgrade to woody. Not only for the 2.4 kernel, but also for more up to date packages and security patches. so do this: debian# vi /etc/apt/sources.list substitute potato w/ woody to upgrade to woody deb http://security.debian.org/debian-security potato/updates main contrib non-free deb http://security.debian.org/debian-non-US potato/non-US main contrib non-free deb http://security.debian.org potato/updates main contrib non-free debian# apt-get dist-upgrade debian# apt-get update debian# apt-get upgrade That's the proper 'debian' way to do it. But if you've already been rooted you'll probably want to start from a fresh install. Download the install floppy images from http://ftp.us.debian.org/debian/dists/woody/main/disks-i386/current/images-1.44/ Hope that helps, and sorry to hear about the root job :( Brad Beck - linux guru in beta I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box on my network and used this exploit to gain root: http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1 The other boxes that are net accessible are openbsd -- This system is a dual p6 so I need debian for smp. Is there a proper 'debian' way to go about patching the kernel against this exploit, or updating the kernel to 2.4. Thanks, David Rolfe @ work -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: 2.2.18 exploit, and updating the kernel
On Fri, Mar 15, 2002 at 06:16:22PM -0500, [EMAIL PROTECTED] wrote: I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box on my network and used this exploit to gain root: http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1 The other boxes that are net accessible are openbsd -- This system is a dual p6 so I need debian for smp. Is there a proper 'debian' way to go about patching the kernel against this exploit, or updating the kernel to 2.4. 2.2.18 is deprecated. Use the latest one (2.2.19) in potato. It's rock solid (some security patches were backported in it). -- Francesco P. Lovergine -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
2.2.18 exploit, and updating the kernel
I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box on my network and used this exploit to gain root: http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1 The other boxes that are net accessible are openbsd -- This system is a dual p6 so I need debian for smp. Is there a proper 'debian' way to go about patching the kernel against this exploit, or updating the kernel to 2.4. Thanks, David Rolfe @ work
Re: 2.2.18 exploit, and updating the kernel
On Fri, 15 Mar 2002 18:16:22 EST [EMAIL PROTECTED] wrote: I get: Could not connect to remote server when I try to follow that link. I get: The address is not available from this machine when I strip out the extra leading : :) I am curious as to seeing what potato is vulnerable to. However: if you want the 2.4.* kernel on your deb box, you should upgrade to woody. Not only for the 2.4 kernel, but also for more up to date packages and security patches. so do this: debian# vi /etc/apt/sources.list substitute potato w/ woody to upgrade to woody deb http://security.debian.org/debian-security potato/updates main contrib non-free deb http://security.debian.org/debian-non-US potato/non-US main contrib non-free deb http://security.debian.org potato/updates main contrib non-free debian# apt-get dist-upgrade debian# apt-get update debian# apt-get upgrade That's the proper 'debian' way to do it. But if you've already been rooted you'll probably want to start from a fresh install. Download the install floppy images from http://ftp.us.debian.org/debian/dists/woody/main/disks-i386/current/images-1.44/ Hope that helps, and sorry to hear about the root job :( Brad Beck - linux guru in beta I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box on my network and used this exploit to gain root: http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1 The other boxes that are net accessible are openbsd -- This system is a dual p6 so I need debian for smp. Is there a proper 'debian' way to go about patching the kernel against this exploit, or updating the kernel to 2.4. Thanks, David Rolfe @ work -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]