Send Bristol mailing list submissions to
bristol@mailman.lug.org.uk
To subscribe or unsubscribe via the World Wide Web, visit
https://mailman.lug.org.uk/mailman/listinfo/bristol
or, via email, send a message with subject or body 'help' to
bristol-request@mailman.lug.org.uk
You can reach the person managing the list at
bristol-owner@mailman.lug.org.uk
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Bristol digest..."
Today's Topics:
1. Re: vulnerability in Synology (Martin Moore)
2. Kindle ePaper screen for the taking (Chris Makepeace)
----------------------------------------------------------------------
Message: 1
Date: Thu, 10 Apr 2014 21:48:48 +0100
From: "Martin Moore" <martinm@it-helps.co.uk>
To: "'Bristol and Bath Linux User Group'" <bristol@mailman.lug.org.uk>
Subject: Re: [bristol] vulnerability in Synology
Message-ID:
<!&!AAAAAAAAAAAYAAAAAAAAAFLxZtQqo65Oo+1jhlUB9DvCgAAAEAAAALla7p6c8IxLoXotSq/Nl5QBAAAAAA==@it-helps.co.uk>
Content-Type: text/plain; charset="us-ascii"
Don't think so as I don't have SSL, although I think they've also fixed that
issue.
Manual install of DSM 5 seems to have got rid of the problem, and a DSM
update has found a patch as well.
Please forward to who you think will benefit.
Martin.
From: bristol-bounces@mailman.lug.org.uk
[mailto:bristol-bounces@mailman.lug.org.uk] On Behalf Of
bblug@gascoigne19.freeserve.co.uk
Sent: 10 April 2014 21:34
To: martinm@it-helps.co.uk; 'Bristol and Bath Linux User Group';
underscore@under-score.org.uk
Subject: Re: [bristol] vulnerability in Synology
Could this be related to the 'Heartbleed' vulnerability that was announced
recently?
If not, let's hope the new DSM fixes it fairly quickly.
Martin, do you mind if I forward this to an ARC mailing list I'm part of, as
I know a few members there have Synology units too?
Cheers,
John
From: bristol-bounces@mailman.lug.org.uk
[mailto:bristol-bounces@mailman.lug.org.uk] On Behalf Of Martin Moore
Sent: 10 April 2014 20:44
To: 'Bristol and Bath Linux User Group'; underscore@under-score.org.uk
Subject: [bristol] vulnerability in Synology
Not sure if anyone's got a Synology Diskstaion - if you have :
There's a vulnerability in Synology (I've been hacked L ) - to see if you've
been hacked open an SSH session and do an ls.
If you get
ERROR: ld.so: object '/lolz/jynx2.so' from LD_PRELOAD cannot be preloaded:
ignored.
You've been got!
There's a updated DSM for it which I'm installing now, but it may need some
manual work to remove the rootkit. Plenty of info if you google the error
line.
Martin.
_____
No virus found in this message.
Checked by AVG - www.avg.com
Version: 2014.0.4355 / Virus Database: 3882/7321 - Release Date: 04/09/14
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.lug.org.uk/mailman/private/bristol/attachments/20140410/e5a8f926/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.gif
Type: image/gif
Size: 92 bytes
Desc: not available
URL: <https://mailman.lug.org.uk/mailman/private/bristol/attachments/20140410/e5a8f926/attachment-0001.gif>
------------------------------
Message: 2
Date: Fri, 11 Apr 2014 01:29:53 +0100
From: Chris Makepeace <chris@makepeace.net>
To: Bristol and Bath Linux User Group <bristol@mailman.lug.org.uk>
Subject: [bristol] Kindle ePaper screen for the taking
Message-ID:
<CACOFJnXwRdNYHojAxfnUEWn60kwLq3dpy6euA2c2OnuwoAn=3g@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Actually, it?s a dead(-ish) Kindle Crude (Mod. D01100) and I don?t want to
throw it away, if possible. It?s at BS6 7TH, No 58 or ring O755O118O63.
?Cheers?
--
ChrisM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.lug.org.uk/mailman/private/bristol/attachments/20140411/b095dc1e/attachment-0001.html>
------------------------------
_______________________________________________
Bristol mailing list
Bristol@mailman.lug.org.uk
https://mailman.lug.org.uk/mailman/listinfo/bristol
End of Bristol Digest, Vol 545, Issue 5
***************************************
Tidak ada komentar:
Posting Komentar