* Linux kernel IGMP vulnerabilities
@ 2004-12-15 8:43 David Jacoby
2004-12-15 9:08 ` YOSHIFUJI Hideaki / 吉藤英明
0 siblings, 1 reply; 15+ messages in thread
From: David Jacoby @ 2004-12-15 8:43 UTC (permalink / raw)
To: linux-kernel
Hi and Merry Xmas everyone!
I just have a little question, is there a way to turn on IGMP support in
the kernel?, I removed
multicast support but is that enugh?
They said that you could see if you are vulnerable by looking at these
files:
/proc/net/igmp
/proc/net/mcfilter
and if both existed and were non-emptu you were vulnerable.
On a defualt installation on Slackware 10 the files mcfilter
is empty but on other servers with various kernel versions
both files contains some data.
The slackware machine is running 2.4.24. As i said i removed
multicast support in the kernel but when i compiled it i saw
that it created igmp.o anyway.
Any advice about how people can patch this security issue?
Thnx!
//David
--
Outpost24 AB
David Jacoby
Research & Development
Office: +46-455-612310
Mobile: +46-455-612311
(www.outpost24.com) (dj@outpost24.com)
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities
2004-12-15 8:43 Linux kernel IGMP vulnerabilities David Jacoby
@ 2004-12-15 9:08 ` YOSHIFUJI Hideaki / 吉藤英明
2004-12-15 11:49 ` Linux kernel IGMP vulnerabilities, PATCH IS BROKEN! David Jacoby
2004-12-16 0:08 ` Linux kernel IGMP vulnerabilities Lukasz Trabinski
0 siblings, 2 replies; 15+ messages in thread
From: YOSHIFUJI Hideaki / 吉藤英明 @ 2004-12-15 9:08 UTC (permalink / raw)
To: dj; +Cc: linux-kernel, yoshfuji
In article <41BFF931.6030205@outpost24.com> (at Wed, 15 Dec 2004 09:43:29 +0100), David Jacoby <dj@outpost24.com> says:
> Any advice about how people can patch this security issue?
http://linux.bkbits.net:8080/linux-2.6/cset@41bf39b1RGfvOMInGewwDyzfcuL2OQ
--yoshfuji
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-15 9:08 ` YOSHIFUJI Hideaki / 吉藤英明
@ 2004-12-15 11:49 ` David Jacoby
2004-12-15 11:54 ` Marc-Christian Petersen
2004-12-16 0:08 ` Linux kernel IGMP vulnerabilities Lukasz Trabinski
1 sibling, 1 reply; 15+ messages in thread
From: David Jacoby @ 2004-12-15 11:49 UTC (permalink / raw)
To: linux-kernel
Hi!
Anyone else tried to apply this patch? The patch does work but not
properly.
I guess the machie is secure against the DoS attack but after i
installed the patch
i cant use SSH.When i tryed to SSH i didnt get any password prompt.
user@autopsia:~$ ssh user@192.168.0.1
Permission denied, please try again.
Permission denied, please try again.
Permission denied (publickey,password,keyboard-interactive).
The patch will crash SSH :|
//David
YOSHIFUJI Hideaki wrote:
>In article <41BFF931.6030205@outpost24.com> (at Wed, 15 Dec 2004 09:43:29 +0100), David Jacoby <dj@outpost24.com> says:
>
>
>
>>Any advice about how people can patch this security issue?
>>
>>
>
>http://linux.bkbits.net:8080/linux-2.6/cset@41bf39b1RGfvOMInGewwDyzfcuL2OQ
>
>--yoshfuji
>
>
>
--
Outpost24 AB
David Jacoby
Research & Development
Office: +46-455-612310
Mobile: +46-455-612311
(www.outpost24.com) (dj@outpost24.com)
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-15 11:49 ` Linux kernel IGMP vulnerabilities, PATCH IS BROKEN! David Jacoby
@ 2004-12-15 11:54 ` Marc-Christian Petersen
2004-12-15 11:56 ` David Jacoby
0 siblings, 1 reply; 15+ messages in thread
From: Marc-Christian Petersen @ 2004-12-15 11:54 UTC (permalink / raw)
To: David Jacoby; +Cc: linux-kernel
On Wednesday 15 December 2004 12:49, David Jacoby wrote:
> Anyone else tried to apply this patch? The patch does work but not
> properly.
> I guess the machie is secure against the DoS attack but after i
> installed the patch
> i cant use SSH.When i tryed to SSH i didnt get any password prompt.
> user@autopsia:~$ ssh user@192.168.0.1
> Permission denied, please try again.
> Permission denied, please try again.
> Permission denied (publickey,password,keyboard-interactive).
> The patch will crash SSH :|
without looking at the patch, I think this isn't the causer of the patch at
all.
ciao, Marc
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-15 11:54 ` Marc-Christian Petersen
@ 2004-12-15 11:56 ` David Jacoby
[not found] ` <20041215120418.GA9049@tufnell.lon1.poggs.net>
` (2 more replies)
0 siblings, 3 replies; 15+ messages in thread
From: David Jacoby @ 2004-12-15 11:56 UTC (permalink / raw)
To: linux-kernel
Marc-Christian Petersen wrote:
>On Wednesday 15 December 2004 12:49, David Jacoby wrote:
>
>
>
>>Anyone else tried to apply this patch? The patch does work but not
>>properly.
>>I guess the machie is secure against the DoS attack but after i
>>installed the patch
>>i cant use SSH.When i tryed to SSH i didnt get any password prompt.
>>user@autopsia:~$ ssh user@192.168.0.1
>>Permission denied, please try again.
>>Permission denied, please try again.
>>Permission denied (publickey,password,keyboard-interactive).
>>The patch will crash SSH :|
>>
>>
>
>without looking at the patch, I think this isn't the causer of the patch at
>all.
>
>ciao, Marc
>
>
>
Well it is, i booted on the old kernel and SSH worked perfect and then
on the new kernel with the patch i cant SSH, i dont even
get an password prompt. I tried to ssh to more than one host aswell, i
also removed the key in .known_hosts but it still doesnt work.
Have you installed the patch?
//David
--
Outpost24 AB
David Jacoby
Research & Development
Office: +46-455-612310
Mobile: +46-455-612311
(www.outpost24.com) (dj@outpost24.com)
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
[not found] ` <20041215120418.GA9049@tufnell.lon1.poggs.net>
@ 2004-12-15 12:11 ` David Jacoby
2004-12-15 14:20 ` YOSHIFUJI Hideaki / 吉藤英明
2004-12-15 18:34 ` Chris Wright
0 siblings, 2 replies; 15+ messages in thread
From: David Jacoby @ 2004-12-15 12:11 UTC (permalink / raw)
To: linux-kernel
Hi Peter!
Well as i said in an earlier mail im using the default 2.4.24 kernel
that is shipped
with Slackware. And the patched kernel is an 2.6.9 kernel from kernel.org
I did an "ssh -vvv" against the same host with different kernel versions
and here is the result:
user@autopisa:~$ diff ssh_new_kernel.log ssh_old_kernel.log > ssh_diff.log
user@autopisa:~$ cat ssh_diff.log
45,46c45,46
< debug2: dh_gen_key: priv key bits set: 129/256
< debug2: bits set: 510/1024
---
> debug2: dh_gen_key: priv key bits set: 126/256
> debug2: bits set: 512/1024
53c53
< debug2: bits set: 529/1024
---
> debug2: bits set: 512/1024
94c94
< debug3: packet_send2: adding 64 (len 49 padlen 15 extra_pad 64)
---
> debug3: packet_send2: adding 64 (len 57 padlen 7 extra_pad 64)
96,107c96,186
< debug1: Authentications that can continue:
publickey,password,keyboard-interactive
< Permission denied, please try again.
< debug3: packet_send2: adding 64 (len 49 padlen 15 extra_pad 64)
< debug2: we sent a password packet, wait for reply
< debug1: Authentications that can continue:
publickey,password,keyboard-interactive
< Permission denied, please try again.
< debug3: packet_send2: adding 64 (len 49 padlen 15 extra_pad 64)
< debug2: we sent a password packet, wait for reply
< debug1: Authentications that can continue:
publickey,password,keyboard-interactive
< debug2: we did not send a packet, disable method
< debug1: No more authentication methods to try.
< Permission denied (publickey,password,keyboard-interactive).
---
> debug1: Authentication succeeded (password).
> debug2: fd 6 setting O_NONBLOCK
> debug1: channel 0: new [client-session]
> debug3: ssh_session2_open: channel_new: 0
> debug2: channel 0: send open
> debug1: Entering interactive session.
> debug2: callback start
> debug2: ssh_session2_setup: id 0
> debug2: channel 0: request pty-req
> debug3: tty_make_modes: ospeed 38400
> debug3: tty_make_modes: ispeed 38400
> debug3: tty_make_modes: 1 3
> debug3: tty_make_modes: 2 28
> debug3: tty_make_modes: 3 127
> debug3: tty_make_modes: 4 21
> debug3: tty_make_modes: 5 4
> debug3: tty_make_modes: 6 0
> debug3: tty_make_modes: 7 0
> debug3: tty_make_modes: 8 17
> debug3: tty_make_modes: 9 19
> debug3: tty_make_modes: 10 26
> debug3: tty_make_modes: 12 18
> debug3: tty_make_modes: 13 23
> debug3: tty_make_modes: 14 22
> debug3: tty_make_modes: 18 15
> debug3: tty_make_modes: 30 0
> debug3: tty_make_modes: 31 0
> debug3: tty_make_modes: 32 0
> debug3: tty_make_modes: 33 0
> debug3: tty_make_modes: 34 0
> debug3: tty_make_modes: 35 0
> debug3: tty_make_modes: 36 1
> debug3: tty_make_modes: 37 0
> debug3: tty_make_modes: 38 1
> debug3: tty_make_modes: 39 0
> debug3: tty_make_modes: 40 0
> debug3: tty_make_modes: 41 0
> debug3: tty_make_modes: 50 1
> debug3: tty_make_modes: 51 1
> debug3: tty_make_modes: 52 0
> debug3: tty_make_modes: 53 1
> debug3: tty_make_modes: 54 1
> debug3: tty_make_modes: 55 1
> debug3: tty_make_modes: 56 0
> debug3: tty_make_modes: 57 0
> debug3: tty_make_modes: 58 0
> debug3: tty_make_modes: 59 1
> debug3: tty_make_modes: 60 1
> debug3: tty_make_modes: 61 1
> debug3: tty_make_modes: 62 0
> debug3: tty_make_modes: 70 1
> debug3: tty_make_modes: 71 0
> debug3: tty_make_modes: 72 1
> debug3: tty_make_modes: 73 0
> debug3: tty_make_modes: 74 0
> debug3: tty_make_modes: 75 0
> debug3: tty_make_modes: 90 1
> debug3: tty_make_modes: 91 1
> debug3: tty_make_modes: 92 0
> debug3: tty_make_modes: 93 0
> debug2: channel 0: request shell
> debug2: fd 3 setting TCP_NODELAY
> debug2: callback done
> debug2: channel 0: open confirm rwindow 0 rmax 32768
> debug2: channel 0: rcvd adjust 131072
> debug2: channel 0: rcvd eof
> debug2: channel 0: output open -> drain
> debug2: channel 0: obuf empty
> debug2: channel 0: close_write
> debug2: channel 0: output drain -> closed
> debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
> debug2: channel 0: rcvd close
> debug2: channel 0: close_read
> debug2: channel 0: input open -> closed
> debug3: channel 0: will not send data after close
> debug2: channel 0: almost dead
> debug2: channel 0: gc: notify user
> debug2: channel 0: gc: user detached
> debug2: channel 0: send close
> debug2: channel 0: is dead
> debug2: channel 0: garbage collecting
> debug1: channel 0: free: client-session, nchannels 1
> debug3: channel 0: status: The following connections are open:
> #0 client-session (t4 r0 i3/0 o3/0 fd -1/-1)
> debug3: channel 0: close_fds r -1 w -1 e 6
> debug1: fd 2 clearing O_NONBLOCK
> Connection to 192.168.200.1 closed.
> debug1: Transferred: stdin 0, stdout 0, stderr 37 bytes in 1.3 seconds
> debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 29.0
> debug1: Exit status 0
The patch fucked something up, sorry for my language. Is there anyone
else on
this list who has the patch installed?
//David
Peter Hicks wrote:
>On Wed, Dec 15, 2004 at 12:56:59PM +0100, David Jacoby wrote:
>
>
>
>>Well it is, i booted on the old kernel and SSH worked perfect and then on
>>the new kernel with the patch i cant SSH, i dont even get an password
>>prompt. I tried to ssh to more than one host aswell, i also removed the
>>key in .known_hosts but it still doesnt work.
>>
>>
>
>Compare the .config of the old and new kernels with 'diff' and check that
>nothing else at all was changed. It is highly improbable that ssh uses IGMP
>functionality!
>
>
>Peter.
>
>
>
--
Outpost24 AB
David Jacoby
Research & Development
Office: +46-455-612310
Mobile: +46-455-612311
(www.outpost24.com) (dj@outpost24.com)
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-15 12:11 ` David Jacoby
@ 2004-12-15 14:20 ` YOSHIFUJI Hideaki / 吉藤英明
2004-12-15 18:34 ` Chris Wright
1 sibling, 0 replies; 15+ messages in thread
From: YOSHIFUJI Hideaki / 吉藤英明 @ 2004-12-15 14:20 UTC (permalink / raw)
To: dj; +Cc: linux-kernel
In article <41C029F7.7010405@outpost24.com> (at Wed, 15 Dec 2004 13:11:35 +0100), David Jacoby <dj@outpost24.com> says:
>
> Well as i said in an earlier mail im using the default 2.4.24 kernel
> that is shipped
> with Slackware. And the patched kernel is an 2.6.9 kernel from kernel.org
please try 2.4.24+patch or such.
--yoshfuji
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-15 12:11 ` David Jacoby
2004-12-15 14:20 ` YOSHIFUJI Hideaki / 吉藤英明
@ 2004-12-15 18:34 ` Chris Wright
2004-12-15 18:50 ` Phil Oester
1 sibling, 1 reply; 15+ messages in thread
From: Chris Wright @ 2004-12-15 18:34 UTC (permalink / raw)
To: David Jacoby; +Cc: linux-kernel
* David Jacoby (dj@outpost24.com) wrote:
> The patch fucked something up, sorry for my language. Is there anyone
> else on
> this list who has the patch installed?
Patch is fine. I've used it and ssh quite a bit. It only touches small
bit of multicast specific code which isn't used at all during ssh session.
thanks,
-chris
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-15 18:34 ` Chris Wright
@ 2004-12-15 18:50 ` Phil Oester
0 siblings, 0 replies; 15+ messages in thread
From: Phil Oester @ 2004-12-15 18:50 UTC (permalink / raw)
To: Chris Wright; +Cc: David Jacoby, linux-kernel
On Wed, Dec 15, 2004 at 10:34:07AM -0800, Chris Wright wrote:
> * David Jacoby (dj@outpost24.com) wrote:
> > The patch fucked something up, sorry for my language. Is there anyone
> > else on
> > this list who has the patch installed?
>
> Patch is fine. I've used it and ssh quite a bit. It only touches small
> bit of multicast specific code which isn't used at all during ssh session.
Yes, user is moving from unpatched 2.4.24 -> patched 2.6.9, and likely has
a pty config issue...
Phil
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-15 11:56 ` David Jacoby
[not found] ` <20041215120418.GA9049@tufnell.lon1.poggs.net>
@ 2004-12-15 19:40 ` David S. Miller
2004-12-16 6:16 ` Willy Tarreau
2004-12-16 22:53 ` Bill Davidsen
2 siblings, 1 reply; 15+ messages in thread
From: David S. Miller @ 2004-12-15 19:40 UTC (permalink / raw)
To: David Jacoby; +Cc: linux-kernel
On Wed, 15 Dec 2004 12:56:59 +0100
David Jacoby <dj@outpost24.com> wrote:
> Well it is, i booted on the old kernel and SSH worked perfect and then
> on the new kernel with the patch i cant SSH, i dont even
> get an password prompt. I tried to ssh to more than one host aswell, i
> also removed the key in .known_hosts but it still doesnt work.
>
> Have you installed the patch?
I'm personally running it everywhere here, and ssh works fine.
There is no way that patch can change SSH behavior, you changed
something else when you updated your kernel.
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities
2004-12-15 9:08 ` YOSHIFUJI Hideaki / 吉藤英明
2004-12-15 11:49 ` Linux kernel IGMP vulnerabilities, PATCH IS BROKEN! David Jacoby
@ 2004-12-16 0:08 ` Lukasz Trabinski
2004-12-16 10:24 ` Marcelo Tosatti
1 sibling, 1 reply; 15+ messages in thread
From: Lukasz Trabinski @ 2004-12-16 0:08 UTC (permalink / raw)
To: linux-kernel
In article <20041215.180839.93043538.yoshfuji@linux-ipv6.org> you wrote:
> In article <41BFF931.6030205@outpost24.com> (at Wed, 15 Dec 2004 09:43:29 +0100), David Jacoby <dj@outpost24.com> says:
>
>> Any advice about how people can patch this security issue?
>
> http://linux.bkbits.net:8080/linux-2.6/cset@41bf39b1RGfvOMInGewwDyzfcuL2OQ
When we can expect officall realase of 2.4.X and 2.6.X with this patch?
--
*[ ŁT ]*
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-15 19:40 ` David S. Miller
@ 2004-12-16 6:16 ` Willy Tarreau
0 siblings, 0 replies; 15+ messages in thread
From: Willy Tarreau @ 2004-12-16 6:16 UTC (permalink / raw)
To: David S. Miller; +Cc: David Jacoby, linux-kernel
On Wed, Dec 15, 2004 at 11:40:17AM -0800, David S. Miller wrote:
> There is no way that patch can change SSH behavior, you changed
> something else when you updated your kernel.
He changed from 2.4.24 to 2.6.9, quite a few megabytes of patch indeed :-)
Willy
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities
2004-12-16 0:08 ` Linux kernel IGMP vulnerabilities Lukasz Trabinski
@ 2004-12-16 10:24 ` Marcelo Tosatti
0 siblings, 0 replies; 15+ messages in thread
From: Marcelo Tosatti @ 2004-12-16 10:24 UTC (permalink / raw)
To: Lukasz Trabinski; +Cc: linux-kernel
On Thu, Dec 16, 2004 at 01:08:09AM +0100, Lukasz Trabinski wrote:
> In article <20041215.180839.93043538.yoshfuji@linux-ipv6.org> you wrote:
> > In article <41BFF931.6030205@outpost24.com> (at Wed, 15 Dec 2004 09:43:29 +0100), David Jacoby <dj@outpost24.com> says:
> >
> >> Any advice about how people can patch this security issue?
> >
> > http://linux.bkbits.net:8080/linux-2.6/cset@41bf39b1RGfvOMInGewwDyzfcuL2OQ
>
> When we can expect officall realase of 2.4.X and 2.6.X with this patch?
2.4.29 final should be released about end of January.
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-15 11:56 ` David Jacoby
[not found] ` <20041215120418.GA9049@tufnell.lon1.poggs.net>
2004-12-15 19:40 ` David S. Miller
@ 2004-12-16 22:53 ` Bill Davidsen
2004-12-17 7:27 ` David Jacoby
2 siblings, 1 reply; 15+ messages in thread
From: Bill Davidsen @ 2004-12-16 22:53 UTC (permalink / raw)
To: David Jacoby; +Cc: linux-kernel
David Jacoby wrote:
> Marc-Christian Petersen wrote:
>
>> On Wednesday 15 December 2004 12:49, David Jacoby wrote:
>>
>>
>>
>>> Anyone else tried to apply this patch? The patch does work but not
>>> properly.
>>> I guess the machie is secure against the DoS attack but after i
>>> installed the patch
>>> i cant use SSH.When i tryed to SSH i didnt get any password prompt.
>>> user@autopsia:~$ ssh user@192.168.0.1
>>> Permission denied, please try again.
>>> Permission denied, please try again.
>>> Permission denied (publickey,password,keyboard-interactive).
>>> The patch will crash SSH :|
>>>
>>
>>
>> without looking at the patch, I think this isn't the causer of the
>> patch at all.
>>
>> ciao, Marc
>>
>>
>>
> Well it is, i booted on the old kernel and SSH worked perfect and then
> on the new kernel with the patch i cant SSH, i dont even
> get an password prompt. I tried to ssh to more than one host aswell, i
> also removed the key in .known_hosts but it still doesnt work.
Are you claiming that the unpatched 2.6 kernel works and the patched
didn't? Or that 2.6 doesn't work right in general on your system because
of configuration issues? Unless the same 2.6 kernel works without the
patch how can you even tell what is failing?
--
-bill davidsen (davidsen@tmr.com)
"The secret to procrastination is to put things off until the
last possible moment - but no longer" -me
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: Linux kernel IGMP vulnerabilities, PATCH IS BROKEN!
2004-12-16 22:53 ` Bill Davidsen
@ 2004-12-17 7:27 ` David Jacoby
0 siblings, 0 replies; 15+ messages in thread
From: David Jacoby @ 2004-12-17 7:27 UTC (permalink / raw)
To: linux-kernel
Bill Davidsen wrote:
> David Jacoby wrote:
>
>> Marc-Christian Petersen wrote:
>>
>>> On Wednesday 15 December 2004 12:49, David Jacoby wrote:
>>>
>>>
>>>
>>>> Anyone else tried to apply this patch? The patch does work but not
>>>> properly.
>>>> I guess the machie is secure against the DoS attack but after i
>>>> installed the patch
>>>> i cant use SSH.When i tryed to SSH i didnt get any password prompt.
>>>> user@autopsia:~$ ssh user@192.168.0.1
>>>> Permission denied, please try again.
>>>> Permission denied, please try again.
>>>> Permission denied (publickey,password,keyboard-interactive).
>>>> The patch will crash SSH :|
>>>>
>>>
>>>
>>>
>>> without looking at the patch, I think this isn't the causer of the
>>> patch at all.
>>>
>>> ciao, Marc
>>>
>>>
>>>
>> Well it is, i booted on the old kernel and SSH worked perfect and
>> then on the new kernel with the patch i cant SSH, i dont even
>> get an password prompt. I tried to ssh to more than one host aswell,
>> i also removed the key in .known_hosts but it still doesnt work.
>
>
> Are you claiming that the unpatched 2.6 kernel works and the patched
> didn't? Or that 2.6 doesn't work right in general on your system
> because of configuration issues? Unless the same 2.6 kernel works
> without the patch how can you even tell what is failing?
>
Well im sorry if i caused some mess ;), but it actually seems that the
patch worked. I have no idea what when wrong the first time but
after further testing it worked. I would say that the problem was behind
the keyboard and not in the patch.
Thanx for all your replies and that you tried to help but it seems that
the patch is fine ;)
--
Outpost24 AB
David Jacoby
Research & Development
Office: +46-455-612310
Mobile: +46-455-612311
(www.outpost24.com) (dj@outpost24.com)
^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2004-12-17 7:28 UTC | newest]
Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-12-15 8:43 Linux kernel IGMP vulnerabilities David Jacoby
2004-12-15 9:08 ` YOSHIFUJI Hideaki / 吉藤英明
2004-12-15 11:49 ` Linux kernel IGMP vulnerabilities, PATCH IS BROKEN! David Jacoby
2004-12-15 11:54 ` Marc-Christian Petersen
2004-12-15 11:56 ` David Jacoby
[not found] ` <20041215120418.GA9049@tufnell.lon1.poggs.net>
2004-12-15 12:11 ` David Jacoby
2004-12-15 14:20 ` YOSHIFUJI Hideaki / 吉藤英明
2004-12-15 18:34 ` Chris Wright
2004-12-15 18:50 ` Phil Oester
2004-12-15 19:40 ` David S. Miller
2004-12-16 6:16 ` Willy Tarreau
2004-12-16 22:53 ` Bill Davidsen
2004-12-17 7:27 ` David Jacoby
2004-12-16 0:08 ` Linux kernel IGMP vulnerabilities Lukasz Trabinski
2004-12-16 10:24 ` Marcelo Tosatti
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox