[olug] Another round: Post your uptime!
Dan Linder
dan at linder.org
Thu Aug 12 14:18:10 UTC 2010
Hmmm... Google "linux kernel exploit 2.6.5-7.111" produces:
* Linux kernel sock_sendpage() denial of service vulnerability
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=37696
<http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=37696>* Linux
kernel IP packet denial of service
http://xforce.iss.net/xforce/xfdb/17800
Having a great up-time is a double-edged sword, but if it's not running
sendmail and it is well firewalled then it is probably not a major concern.
Truly, anything with a connection to the outside world has
the possibility of being DOS'd or Root'ed. But then that negates a
networked servers functionality.
Congrats on the uptime none the less!
Dan
On Thu, Aug 12, 2010 at 00:21, Brian Roberson <brian at bstc.net> wrote:
> <hidden>:/var/spool # uname -a
> Linux <hidden> 2.6.5-7.111-default #1 Wed Oct 13 15:45:13 UTC 2004 i686
> i686
> i386 GNU/Linux
> <hidden>:/var/spool # cat /etc/SuSE-release
> SuSE Linux 9.1 (i586)
> VERSION = 9.1
> <hidden>:/var/spool # uptime
> 12:17am up 1480 days 19:09, 2 users, load average: 0.45, 0.65, 0.38
> <hidden>:/var/spool #
>
>
>
>
> w00t!
> _______________________________________________
> OLUG mailing list
> OLUG at olug.org
> https://lists.olug.org/mailman/listinfo/olug
>
--
***************** ************* *********** ******* ***** *** **
"Quis custodiet ipsos custodes?"
(Who can watch the watchmen?)
-- from the Satires of Juvenal
"I do not fear computers, I fear the lack of them."
-- Isaac Asimov (Author)
** *** ***** ******* *********** ************* *****************
More information about the OLUG
mailing list