Re: RedHat: Buffer Overflow in "ls" and "mkdir"

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Athul Acharya wrote: | it's not; I see no record of this vuln. elsewhere and whois records | show no affiliation between fedora-redhat.com and redhat.com. Looks

Yes, the domain was registered on 24th Oct 2004 (today).

On http://www.redhat.com/security/ ,

"Red Hat has been made aware that emails are circulating that pretend to
come from the Red Hat Security Team. These emails tell users to download
and run an update from a users home directory. This fake update appears
to contain malicious code. Official messages from the Red Hat security
team are never sent unsolicited, are always sent from the address
secalert@xxxxxxxxxx, and are digitally signed by GPG. All official
updates for Red Hat products are digitally signed and should not be
installed unless they are correctly signed and the signature is verified."

Regards,
Manish

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFBfEar9364pdQFFqARAtygAKCxlwFzLatieMIgGFvJ4h0cYd9PzgCfQSFC
CExV230WH13fHVY/9/AMl20=
=Ln8Q
-----END PGP SIGNATURE-----

--
Kernelnewbies: Help each other learn about the Linux kernel.
Archive:       http://mail.nl.linux.org/kernelnewbies/
FAQ:           http://kernelnewbies.org/faq/


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux