I've spent the past couple of days dealing with a major security incident on
the SRCF's main server, pip (almost exactly 18 months since our last such incident). Now that things have calmed down a bit, I thought I'd write something about it for those who expressed an interest in the details.
(
Read more... )
Comments 6
In a chat with Scotsman at work the following day, he mentioned that he'd tried the exploit on his server, had it work, installed the patch, _not rebooted_, tried the exploit again, and had it fail.
Some post-pub investigation that night with mas90 demonstrated that simply installing the patch (no reboot / (explicit) udevd restart) fixed Debian 5.0 Lenny (on one of my machines), and whichever Debian flavour Scotsman runs, while leaving Ubuntu 8.04 (on one of mas90's machines) and presumably 8.10 (as run by pip) vulnerable until an explicit udevd restart.
Reply
Reply
Reply
Reply
Reply
Reply
Leave a comment