SCIENTIFIC-LINUX-USERS Archives

January 2023

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Konstantin Olchanski <[log in to unmask]>
Reply To:
Konstantin Olchanski <[log in to unmask]>
Date:
Mon, 9 Jan 2023 18:09:19 -0800
Content-Type:
text/plain
Parts/Attachments:
text/plain (18 lines)
On Mon, Jan 09, 2023 at 03:26:33PM -0800, Yasha Karant wrote:
> 
> The SL6 issue is a different matter.  Not only are various
> applications vulnerable to compromises from the Internet, but so is
> the kernel as well as kernel systems support software.
>

This is FUD. Which applications, which exploits? AFAIK, there is
no remote exploits against SL6 ssh, there is no remote exploits
against SL6 apache and there is no remote exploits agaist SL6 linux
kernels. If you know otherwises, please post a list of applicable CVEs.

-- 
Konstantin Olchanski
Data Acquisition Systems: The Bytes Must Flow!
Email: olchansk-at-triumf-dot-ca
Snail mail: 4004 Wesbrook Mall, TRIUMF, Vancouver, B.C., V6T 2A3, Canada

ATOM RSS1 RSS2