Thu Dec 5 12:19:38 2024
EVENTS
 FREE
SOFTWARE
INSTITUTE

POLITICS
JOBS
MEMBERS'
CORNER

MAILING
LIST

NYLXS Mailing Lists and Archives
NYLXS Members have a lot to say and share but we don't keep many secrets. Join the Hangout Mailing List and say your peice.

DATE 2018-03-01

HANGOUT

2024-12-05 | 2024-11-05 | 2024-10-05 | 2024-09-05 | 2024-08-05 | 2024-07-05 | 2024-06-05 | 2024-05-05 | 2024-04-05 | 2024-03-05 | 2024-02-05 | 2024-01-05 | 2023-12-05 | 2023-11-05 | 2023-10-05 | 2023-09-05 | 2023-08-05 | 2023-07-05 | 2023-06-05 | 2023-05-05 | 2023-04-05 | 2023-03-05 | 2023-02-05 | 2023-01-05 | 2022-12-05 | 2022-11-05 | 2022-10-05 | 2022-09-05 | 2022-08-05 | 2022-07-05 | 2022-06-05 | 2022-05-05 | 2022-04-05 | 2022-03-05 | 2022-02-05 | 2022-01-05 | 2021-12-05 | 2021-11-05 | 2021-10-05 | 2021-09-05 | 2021-08-05 | 2021-07-05 | 2021-06-05 | 2021-05-05 | 2021-04-05 | 2021-03-05 | 2021-02-05 | 2021-01-05 | 2020-12-05 | 2020-11-05 | 2020-10-05 | 2020-09-05 | 2020-08-05 | 2020-07-05 | 2020-06-05 | 2020-05-05 | 2020-04-05 | 2020-03-05 | 2020-02-05 | 2020-01-05 | 2019-12-05 | 2019-11-05 | 2019-10-05 | 2019-09-05 | 2019-08-05 | 2019-07-05 | 2019-06-05 | 2019-05-05 | 2019-04-05 | 2019-03-05 | 2019-02-05 | 2019-01-05 | 2018-12-05 | 2018-11-05 | 2018-10-05 | 2018-09-05 | 2018-08-05 | 2018-07-05 | 2018-06-05 | 2018-05-05 | 2018-04-05 | 2018-03-05 | 2018-02-05 | 2018-01-05 | 2017-12-05 | 2017-11-05 | 2017-10-05 | 2017-09-05 | 2017-08-05 | 2017-07-05 | 2017-06-05 | 2017-05-05 | 2017-04-05 | 2017-03-05 | 2017-02-05 | 2017-01-05 | 2016-12-05 | 2016-11-05 | 2016-10-05 | 2016-09-05 | 2016-08-05 | 2016-07-05 | 2016-06-05 | 2016-05-05 | 2016-04-05 | 2016-03-05 | 2016-02-05 | 2016-01-05 | 2015-12-05 | 2015-11-05 | 2015-10-05 | 2015-09-05 | 2015-08-05 | 2015-07-05 | 2015-06-05 | 2015-05-05 | 2015-04-05 | 2015-03-05 | 2015-02-05 | 2015-01-05 | 2014-12-05 | 2014-11-05 | 2014-10-05 | 2014-09-05 | 2014-08-05 | 2014-07-05 | 2014-06-05 | 2014-05-05 | 2014-04-05 | 2014-03-05 | 2014-02-05 | 2014-01-05 | 2013-12-05 | 2013-11-05 | 2013-10-05 | 2013-09-05 | 2013-08-05 | 2013-07-05 | 2013-06-05 | 2013-05-05 | 2013-04-05 | 2013-03-05 | 2013-02-05 | 2013-01-05 | 2012-12-05 | 2012-11-05 | 2012-10-05 | 2012-09-05 | 2012-08-05 | 2012-07-05 | 2012-06-05 | 2012-05-05 | 2012-04-05 | 2012-03-05 | 2012-02-05 | 2012-01-05 | 2011-12-05 | 2011-11-05 | 2011-10-05 | 2011-09-05 | 2011-08-05 | 2011-07-05 | 2011-06-05 | 2011-05-05 | 2011-04-05 | 2011-03-05 | 2011-02-05 | 2011-01-05 | 2010-12-05 | 2010-11-05 | 2010-10-05 | 2010-09-05 | 2010-08-05 | 2010-07-05 | 2010-06-05 | 2010-05-05 | 2010-04-05 | 2010-03-05 | 2010-02-05 | 2010-01-05 | 2009-12-05 | 2009-11-05 | 2009-10-05 | 2009-09-05 | 2009-08-05 | 2009-07-05 | 2009-06-05 | 2009-05-05 | 2009-04-05 | 2009-03-05 | 2009-02-05 | 2009-01-05 | 2008-12-05 | 2008-11-05 | 2008-10-05 | 2008-09-05 | 2008-08-05 | 2008-07-05 | 2008-06-05 | 2008-05-05 | 2008-04-05 | 2008-03-05 | 2008-02-05 | 2008-01-05 | 2007-12-05 | 2007-11-05 | 2007-10-05 | 2007-09-05 | 2007-08-05 | 2007-07-05 | 2007-06-05 | 2007-05-05 | 2007-04-05 | 2007-03-05 | 2007-02-05 | 2007-01-05 | 2006-12-05 | 2006-11-05 | 2006-10-05 | 2006-09-05 | 2006-08-05 | 2006-07-05 | 2006-06-05 | 2006-05-05 | 2006-04-05 | 2006-03-05 | 2006-02-05 | 2006-01-05 | 2005-12-05 | 2005-11-05 | 2005-10-05 | 2005-09-05 | 2005-08-05 | 2005-07-05 | 2005-06-05 | 2005-05-05 | 2005-04-05 | 2005-03-05 | 2005-02-05 | 2005-01-05 | 2004-12-05 | 2004-11-05 | 2004-10-05 | 2004-09-05 | 2004-08-05 | 2004-07-05 | 2004-06-05 | 2004-05-05 | 2004-04-05 | 2004-03-05 | 2004-02-05 | 2004-01-05 | 2003-12-05 | 2003-11-05 | 2003-10-05 | 2003-09-05 | 2003-08-05 | 2003-07-05 | 2003-06-05 | 2003-05-05 | 2003-04-05 | 2003-03-05 | 2003-02-05 | 2003-01-05 | 2002-12-05 | 2002-11-05 | 2002-10-05 | 2002-09-05 | 2002-08-05 | 2002-07-05 | 2002-06-05 | 2002-05-05 | 2002-04-05 | 2002-03-05 | 2002-02-05 | 2002-01-05 | 2001-12-05 | 2001-11-05 | 2001-10-05 | 2001-09-05 | 2001-08-05 | 2001-07-05 | 2001-06-05 | 2001-05-05 | 2001-04-05 | 2001-03-05 | 2001-02-05 | 2001-01-05 | 2000-12-05 | 2000-11-05 | 2000-10-05 | 2000-09-05 | 2000-08-05 | 2000-07-05 | 2000-06-05 | 2000-05-05 | 2000-04-05 | 2000-03-05 | 2000-02-05 | 2000-01-05 | 1999-12-05

Key: Value:

Key: Value:

MESSAGE
DATE 2018-03-04
FROM valdis.kletnieks@vt.edu
SUBJECT Re: [Hangout - NYLXS] Year 2038 time set problem
From hangout-bounces-at-nylxs.com Mon Mar 5 20:47:48 2018
Return-Path:
X-Original-To: archive-at-mrbrklyn.com
Delivered-To: archive-at-mrbrklyn.com
Received: from www2.mrbrklyn.com (www2.mrbrklyn.com [96.57.23.82])
by mrbrklyn.com (Postfix) with ESMTP id 775A3163F5E;
Mon, 5 Mar 2018 20:47:48 -0500 (EST)
X-Original-To: hangout-at-www2.mrbrklyn.com
Delivered-To: hangout-at-www2.mrbrklyn.com
Received: by mrbrklyn.com (Postfix, from userid 1000)
id 58143163F57; Mon, 5 Mar 2018 20:47:46 -0500 (EST)
Resent-From: Ruben Safir
Resent-Date: Mon, 5 Mar 2018 20:47:46 -0500
Resent-Message-ID: <20180306014746.GZ2765-at-www2.mrbrklyn.com>
Resent-To: hangout-at-mrbrklyn.com
X-Original-To: ruben-at-mrbrklyn.com
Delivered-To: ruben-at-mrbrklyn.com
Received: from shelob.surriel.com (unknown [96.67.55.147])
by mrbrklyn.com (Postfix) with ESMTP id 9055E161132
for ; Sun, 4 Mar 2018 13:31:44 -0500 (EST)
Received: from localhost ([::1] helo=shelob.surriel.com)
by shelob.surriel.com with esmtp (Exim 4.89)
(envelope-from )
id 1esYPp-0008Bc-4r; Sun, 04 Mar 2018 13:31:21 -0500
Received: from omr2.cc.ipv6.vt.edu ([2607:b400:92:8400:0:33:fb76:806e]
helo=omr2.cc.vt.edu)
by shelob.surriel.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
(Exim 4.89) (envelope-from ) id 1esYPi-0008BW-75
for kernelnewbies-at-kernelnewbies.org; Sun, 04 Mar 2018 13:31:14 -0500
Received: from mr6.cc.vt.edu (mr6.cc.vt.edu
[IPv6:2607:b400:92:8500:0:af:2d00:4488])
by omr2.cc.vt.edu (8.14.4/8.14.4) with ESMTP id w24IVCpO007482
for ; Sun, 4 Mar 2018 13:31:12 -0500
Received: from mail-qt0-f199.google.com (mail-qt0-f199.google.com
[209.85.216.199])
by mr6.cc.vt.edu (8.14.7/8.14.7) with ESMTP id w24IV7PR012288
for ; Sun, 4 Mar 2018 13:31:12 -0500
Received: by mail-qt0-f199.google.com with SMTP id 29so1217382qto.10
for ; Sun, 04 Mar 2018 10:31:12 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:sender:from:to:cc:subject:in-reply-to:references
:mime-version:content-transfer-encoding:date:message-id;
bh=K/PqdRN9fg3dfZ8D0G85dHEkjRcU0flzl4qf4acCMHE=;
b=ogDDQ4PJjunrEXlf8gTjlrv9EIhMEd6NkXOiFQRZuS/tTtEI/jblh6LY00I7pKI8pZ
0q66Yz+iGitTmoDCxBVdWT5CUzXpTAyy3Tex0ruCrc7nlje+rutQR0I9wRW7mPFDfHxD
2UecqclabGVqi8TGDiUsJqsNWCYycl9hiPPhE97cuQXMxolwtBKIVbq9kx4Sn6adM9NR
IfLZN/FBFrY84e/lHptwQxj76ob9c71l6Sm9qanvKo0c72kOPHwAty1X0915rkIuA5B8
n+llRCS0DnOjtZW0Q6zI+nsqyqkBBM5imyLC9L0Ikp4qSVYa8hQIrBq10NMDdJFAiXlf
SPIQ==
X-Gm-Message-State: AElRT7FeFDBlThYcPW84hEMSTJ1hhrZHmQv1EkqVT0nd39W/93F+1s1w
KqedyhCUNMKCL277lNi4Lw0nrXv7U7op6g77xB0xL0BoOWJwllmSO7zeN/+ILOBtiValNV5Zfg8
AjXgHnMi9rJjIlrl0DmzXGxucPVtwZCopdnc4tG8=
X-Received: by 10.55.43.70 with SMTP id r67mr18127418qkh.17.1520188267078;
Sun, 04 Mar 2018 10:31:07 -0800 (PST)
X-Google-Smtp-Source: AG47ELte+gVEy+2NV4sUmiPzWRmmA6Qeu1CPY2t8BMeS+loXfYyiUHiN6rwfP84GXrgg4/u2FPwnaQ==
X-Received: by 10.55.43.70 with SMTP id r67mr18127399qkh.17.1520188266710;
Sun, 04 Mar 2018 10:31:06 -0800 (PST)
Received: from turing-police.cc.vt.edu
([2601:5c0:c001:4342:7d23:349e:fc99:eb05])
by smtp.gmail.com with ESMTPSA id f6sm5299400qth.44.2018.03.04.10.31.04
(version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256);
Sun, 04 Mar 2018 10:31:05 -0800 (PST)
From: valdis.kletnieks-at-vt.edu
X-Google-Original-From: Valdis.Kletnieks-at-vt.edu
X-Mailer: exmh version 2.8.0 04/21/2017 with nmh-1.7+dev
To: tali.perry-at-nuvoton.com
In-Reply-To: <6c56e171e9194485b4c89fe1eb2b9168-at-NTILML02.nuvoton.com>
References: <6c56e171e9194485b4c89fe1eb2b9168-at-NTILML02.nuvoton.com>
Mime-Version: 1.0
Date: Sun, 04 Mar 2018 13:31:04 -0500
Message-ID: <50050.1520188264-at-turing-police.cc.vt.edu>
X-BeenThere: kernelnewbies-at-kernelnewbies.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Archive:
Content-Type: multipart/mixed; boundary="===============0003081298207404477=="
X-UID: 46763
Cc: kernelnewbies-at-kernelnewbies.org
Subject: Re: [Hangout - NYLXS] Year 2038 time set problem
X-BeenThere: hangout-at-nylxs.com
List-Id: NYLXS Tech Talk and Politics
List-Unsubscribe: ,

List-Post:
List-Help:
List-Subscribe: ,

Errors-To: hangout-bounces-at-nylxs.com
Sender: "Hangout"

--===============0003081298207404477==
Content-Type: multipart/signed; boundary="==_Exmh_1520188264_14985P";
micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit

--==_Exmh_1520188264_14985P
Content-Type: text/plain; charset=us-ascii

On Sun, 04 Mar 2018 06:59:46 +0000, tali.perry-at-nuvoton.com said:
> It is not secure because it is not fixed for these issues:
> https://meltdownattack.com/

Note that saying "The CPU isn't vulnerable to Meltdown/Spectre, therefor
the 4.1 kernel is OK" is *incredibly* wrong.

For the record, since 4.1 came out, there's been at *least* a dozen security
issues in the Linux kernel that have been a *lot* scarier for security
professionals than the Meltdown/Spectre issue. That only got any news coverage
because it was an actual hardware design flaw that was believed to be difficult
to easily fix with software changes...

For example, here's a partial list of known security issues fixed in *just* 4.14.8:

(You want the full list, it's here: https://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/cvssscoremin-7/cvssscoremax-7.99/Linux-Linux-Kernel.html

Looks like there were some 298 CVE numbers assigned to the Linux kernel
after the 4.1 release date. Note that this doe *NOT* include fixed bugs
that had security implications but were not assigned a CVE number)

CVE-2017-17857 The check_stack_boundary function in kernel/bpf/verifier.c in
the Linux kernel through 4.14.8 allows local users to cause a denial of service
(memory corruption) or possibly have unspecified other impact by leveraging
mishandling of invalid variable stack read operations.

CVE-2017-17856 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (memory corruption) or possibly have
unspecified other impact by leveraging the lack of stack-pointer alignment
enforcement.

CVE-2017-17855 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (memory corruption) or possibly have
unspecified other impact by leveraging improper use of pointers in place of
scalars.

CVE-2017-17854 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (integer overflow and memory
corruption) or possibly have unspecified other impact by leveraging
unrestricted integer values for pointer arithmetic.

CVE-2017-17853 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (memory corruption) or possibly have
unspecified other impact by leveraging incorrect BPF_RSH signed bounds
calculations.

CVE-2017-17852 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (memory corruption) or possibly have
unspecified other impact by leveraging mishandling of 32-bit ALU ops.

CVE-2017-17806 The HMAC implementation (crypto/hmac.c) in the Linux kernel
before 4.14.8 does not validate that the underlying cryptographic hash
algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based
hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm
(CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a
crafted sequence of system calls that encounter a missing SHA-3 initialization.

CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before
4.14.8 does not correctly handle zero-length inputs, allowing a local attacker
able to use the AF_ALG-based skcipher interface
(CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service
(uninitialized-memory free and kernel crash) or have unspecified other impact
by executing a crafted sequence of system calls that use the blkcipher_walk
API. Both the generic implementation (crypto/salsa20_generic.c) and x86
implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.


--==_Exmh_1520188264_14985P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Comment: Exmh version 2.8.0 04/21/2017

iQEVAwUBWpw7aI0DS38y7CIcAQI4wQf+IZdvHREgdFBRvPHv4YMyCV27o6618smb
+bIPFvEexx9boI0Ot/+ZEJQGEkLON/RPRSIt/YSQEA1qKGomQflCR94YQ+AtAyc2
jJJfRxqbg+zPlRGdLfPdqp6SZCzSdUfPLEWdT5cQd0TywQ1Fz5vOShrqU/hVKhhF
aWc7cy3KANyHbLXFFC28I5jZR4QCaBcOYCNqcmpjvmWVDc6Y3rn8Y/7dsDl+gjP/
9Wfj/ax8E1P2axuWutD9rkk8qK0MihxfazJo7sq4lMoeur/xQWYDwxeJ1ySucqYR
QgeO7NXPhNuTXmZu8QgcVZmCIjPwwin78JDUERpqe+xK/dNG0n/yBA==
=41TI
-----END PGP SIGNATURE-----

--==_Exmh_1520188264_14985P--


--===============0003081298207404477==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies-at-kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies

--===============0003081298207404477==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Hangout mailing list
Hangout-at-nylxs.com
http://lists.mrbrklyn.com/mailman/listinfo/hangout

--===============0003081298207404477==--

--===============0003081298207404477==
Content-Type: multipart/signed; boundary="==_Exmh_1520188264_14985P";
micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit

--==_Exmh_1520188264_14985P
Content-Type: text/plain; charset=us-ascii

On Sun, 04 Mar 2018 06:59:46 +0000, tali.perry-at-nuvoton.com said:
> It is not secure because it is not fixed for these issues:
> https://meltdownattack.com/

Note that saying "The CPU isn't vulnerable to Meltdown/Spectre, therefor
the 4.1 kernel is OK" is *incredibly* wrong.

For the record, since 4.1 came out, there's been at *least* a dozen security
issues in the Linux kernel that have been a *lot* scarier for security
professionals than the Meltdown/Spectre issue. That only got any news coverage
because it was an actual hardware design flaw that was believed to be difficult
to easily fix with software changes...

For example, here's a partial list of known security issues fixed in *just* 4.14.8:

(You want the full list, it's here: https://www.cvedetails.com/vulnerability-list/vendor_id-33/product_id-47/cvssscoremin-7/cvssscoremax-7.99/Linux-Linux-Kernel.html

Looks like there were some 298 CVE numbers assigned to the Linux kernel
after the 4.1 release date. Note that this doe *NOT* include fixed bugs
that had security implications but were not assigned a CVE number)

CVE-2017-17857 The check_stack_boundary function in kernel/bpf/verifier.c in
the Linux kernel through 4.14.8 allows local users to cause a denial of service
(memory corruption) or possibly have unspecified other impact by leveraging
mishandling of invalid variable stack read operations.

CVE-2017-17856 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (memory corruption) or possibly have
unspecified other impact by leveraging the lack of stack-pointer alignment
enforcement.

CVE-2017-17855 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (memory corruption) or possibly have
unspecified other impact by leveraging improper use of pointers in place of
scalars.

CVE-2017-17854 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (integer overflow and memory
corruption) or possibly have unspecified other impact by leveraging
unrestricted integer values for pointer arithmetic.

CVE-2017-17853 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (memory corruption) or possibly have
unspecified other impact by leveraging incorrect BPF_RSH signed bounds
calculations.

CVE-2017-17852 kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows
local users to cause a denial of service (memory corruption) or possibly have
unspecified other impact by leveraging mishandling of 32-bit ALU ops.

CVE-2017-17806 The HMAC implementation (crypto/hmac.c) in the Linux kernel
before 4.14.8 does not validate that the underlying cryptographic hash
algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based
hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm
(CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a
crafted sequence of system calls that encounter a missing SHA-3 initialization.

CVE-2017-17805 The Salsa20 encryption algorithm in the Linux kernel before
4.14.8 does not correctly handle zero-length inputs, allowing a local attacker
able to use the AF_ALG-based skcipher interface
(CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service
(uninitialized-memory free and kernel crash) or have unspecified other impact
by executing a crafted sequence of system calls that use the blkcipher_walk
API. Both the generic implementation (crypto/salsa20_generic.c) and x86
implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.


--==_Exmh_1520188264_14985P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Comment: Exmh version 2.8.0 04/21/2017

iQEVAwUBWpw7aI0DS38y7CIcAQI4wQf+IZdvHREgdFBRvPHv4YMyCV27o6618smb
+bIPFvEexx9boI0Ot/+ZEJQGEkLON/RPRSIt/YSQEA1qKGomQflCR94YQ+AtAyc2
jJJfRxqbg+zPlRGdLfPdqp6SZCzSdUfPLEWdT5cQd0TywQ1Fz5vOShrqU/hVKhhF
aWc7cy3KANyHbLXFFC28I5jZR4QCaBcOYCNqcmpjvmWVDc6Y3rn8Y/7dsDl+gjP/
9Wfj/ax8E1P2axuWutD9rkk8qK0MihxfazJo7sq4lMoeur/xQWYDwxeJ1ySucqYR
QgeO7NXPhNuTXmZu8QgcVZmCIjPwwin78JDUERpqe+xK/dNG0n/yBA==
=41TI
-----END PGP SIGNATURE-----

--==_Exmh_1520188264_14985P--


--===============0003081298207404477==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Kernelnewbies mailing list
Kernelnewbies-at-kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies

--===============0003081298207404477==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Hangout mailing list
Hangout-at-nylxs.com
http://lists.mrbrklyn.com/mailman/listinfo/hangout

--===============0003081298207404477==--

  1. 2018-03-01 From: "Free Software Foundation" <info-at-fsf.org> Subject: [Hangout - NYLXS] Free Software Supporter Issue 119, March 2018
  2. 2018-03-04 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  3. 2018-03-05 Greg KH <greg-at-kroah.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  4. 2018-03-05 From: "APhA's Pharmacy Today" <PTdaily-at-aphanet.org> Subject: [Hangout - NYLXS] March 5,
  5. 2018-03-01 From: "Canarsie Courier" <emailsentby-at-icontactmail.com> Subject: [Hangout - NYLXS] Inside This Week's Edition of the Canarsie Courier
  6. 2018-03-05 Gabor Szabo <gabor-at-szabgab.com> Subject: [Hangout - NYLXS] [Perlweekly] #345 - Plenty of posts
  7. 2018-03-05 From: "IEEE ComSoc Meetings" <noreply-at-comsoc.org> Subject: [Hangout - NYLXS] IEEE GLOBECOM'18 Workshop Deadline Extended
  8. 2018-03-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  9. 2018-03-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  10. 2018-03-05 Greg KH <greg-at-kroah.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  11. 2018-03-05 Greg KH <greg-at-kroah.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  12. 2018-03-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  13. 2018-03-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  14. 2018-03-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  15. 2018-03-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  16. 2018-03-05 valdis.kletnieks-at-vt.edu Re: [Hangout - NYLXS] Year 2038 time set problem
  17. 2018-03-05 Greg KH <greg-at-kroah.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  18. 2018-03-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  19. 2018-03-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  20. 2018-03-05 Greg KH <greg-at-kroah.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  21. 2018-03-05 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  22. 2018-03-04 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  23. 2018-03-04 valdis.kletnieks-at-vt.edu Re: [Hangout - NYLXS] Year 2038 time set problem
  24. 2018-03-04 Alex Arvelaez <ealejandro-at-outlook.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  25. 2018-03-04 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  26. 2018-03-04 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  27. 2018-03-04 valdis.kletnieks-at-vt.edu Re: [Hangout - NYLXS] Year 2038 time set problem
  28. 2018-03-04 valdis.kletnieks-at-vt.edu Re: [Hangout - NYLXS] Year 2038 time set problem
  29. 2018-03-04 Greg KH <greg-at-kroah.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  30. 2018-03-04 Alex Arvelaez <ealejandro-at-outlook.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  31. 2018-03-04 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout - NYLXS] Year 2038 time set problem
  32. 2018-03-04 valdis.kletnieks-at-vt.edu Re: [Hangout - NYLXS] Year 2038 time set problem
  33. 2018-03-01 From: "SUSE" <news-at-suse.com> Subject: [Hangout - NYLXS] =?utf-8?q?Open_Source_Software=3A_There?=
  34. 2018-03-07 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Look Ma, I invented the internet
  35. 2018-03-07 Ruben <mrbrklyn-at-panix.com> Subject: [Hangout - NYLXS] Best Scam
  36. 2018-03-08 James E Keenan <jkeenan-at-pobox.com> Subject: [Hangout - NYLXS] ny.pm technical meeting: Wed Mar 28 at MongoDB
  37. 2018-03-08 James E Keenan <jkeenan-at-pobox.com> Subject: [Hangout - NYLXS] Perl Conference 2018 in Salt Lake City:
  38. 2018-03-06 From: "[RSS/Feed] nixCraft: Linux Tips, Hacks, Tutorials, Subject: [Hangout - NYLXS] nixCraft Linux / UNIX Newsletter
  39. 2018-03-06 From: "Linux Journal Subscription" <subs-at-linuxjournal.com> Subject: [Hangout - NYLXS] March 2018 issue to be released next week!
  40. 2018-03-08 From: "Canarsie Courier" <emailsentby-at-icontactmail.com> Subject: [Hangout - NYLXS] Inside This Week's Edition of the Canarsie Courier
  41. 2018-03-10 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Jobs are Rockerfeller University
  42. 2018-03-10 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Jobs at Colombia
  43. 2018-03-10 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] jobs at robots
  44. 2018-03-12 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Your Tax Dollars at Work
  45. 2018-03-12 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] The must significant news this week that will
  46. 2018-03-12 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] UDF Skywalker
  47. 2018-03-14 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] predictability and AI on PBS Nova
  48. 2018-03-20 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Fwd: Re: LKCAMP - Linux Kernel study group -
  49. 2018-03-20 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Fwd: [mothur] Reproducible Research Tutorials
  50. 2018-03-20 From: "Pat Schloss" <pschloss-at-umich.edu> Subject: [Hangout - NYLXS] [mothur] Reproducible Research Tutorials with
  51. 2018-03-20 Helen Fornazier <helen.fornazier-at-gmail.com> Re: [Hangout - NYLXS] LKCAMP - Linux Kernel study group - volunteers
  52. 2018-03-20 Helen Fornazier <helen.fornazier-at-gmail.com> Re: [Hangout - NYLXS] LKCAMP - Linux Kernel study group - volunteers
  53. 2018-03-18 Helen Fornazier <helen.fornazier-at-gmail.com> Subject: [Hangout - NYLXS] LKCAMP - Linux Kernel study group - volunteers
  54. 2018-03-12 Gabor Szabo <gabor-at-szabgab.com> Subject: [Hangout - NYLXS] [Perlweekly] #346 - Conferences, Workshops,
  55. 2018-03-19 Gabor Szabo <gabor-at-szabgab.com> Subject: [Hangout - NYLXS] [Perlweekly] #347 - Happy belated Pi day!
  56. 2018-03-19 James E Keenan <jkeenan-at-pobox.com> Subject: [Hangout - NYLXS] Help get Perl 5.28 ready: test CPAN against dev
  57. 2018-03-21 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] urgent protest
  58. 2018-03-21 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] start the revolution
  59. 2018-03-21 From: "Georgia Young, FSF" <info-at-fsf.org> Subject: [Hangout - NYLXS] LibrePlanet 2018: Last update!
  60. 2018-03-21 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] hipsters don't have kids
  61. 2018-03-22 ruben <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] DNA as a computer
  62. 2018-03-23 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout - NYLXS] Movie of the Week
  63. 2018-03-23 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Kill the Kings Highway SBS
  64. 2018-03-23 From: "Deutsch, Chaim" <CDeutsch-at-council.nyc.gov> Subject: [Hangout - NYLXS] THE DEUTSCH REPORT: News From Councilmember Chaim
  65. 2018-03-26 Gabor Szabo <gabor-at-szabgab.com> Subject: [Hangout - NYLXS] [Perlweekly] #348 - Submit a grant application
  66. 2018-03-25 James E Keenan <jkeenan-at-pobox.com> Subject: [Hangout - NYLXS] Fwd: [Perl Conference NA Announce] The Perl
  67. 2018-03-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] check out this con artist on reddit
  68. 2018-03-26 From: "Mancini, Sabin (DFS)" <Sabin.Mancini-at-dfs.ny.gov> Re: [Hangout - NYLXS] check out this con artist on reddit | | Need
  69. 2018-03-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] New GIMP release
  70. 2018-03-27 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout - NYLXS] This is not the NYLXS I was looking for
  71. 2018-03-27 James E Keenan <jkeenan-at-pobox.com> Re: [Hangout - NYLXS] ny.pm technical meeting: Wed Mar 28 at MongoDB
  72. 2018-03-30 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] The Dream of a Free Phone ...
  73. 2018-03-30 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Happy Peasach and Holidays
  74. 2018-03-30 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout - NYLXS] Private sector discrimination enmasse
  75. 2018-03-30 FarSight Data Systems <msh-at-farsight-data.com> Re: [Hangout - NYLXS] Happy Peasach and Holidays
  76. 2018-03-09 Clive Holloway <clive.holloway-at-gmail.com> Re: [Hangout - NYLXS] ny.pm technical meeting: Wed Mar 28 at MongoDB
  77. 2018-03-09 Clive Holloway <clive.holloway-at-gmail.com> Re: [Hangout - NYLXS] ny.pm technical meeting: Wed Mar 28 at MongoDB

NYLXS are Do'ers and the first step of Doing is Joining! Join NYLXS and make a difference in your community today!