On Tue, Apr 20, 2004 at 11:40:13AM +1000, Russell Coker wrote:
> On Tue, 20 Apr 2004 07:50, Jan Minar <[EMAIL PROTECTED]> wrote:
> > It seems like they should be 660, not 600, as I suggested (wall(1) and
> > talkd(1) would break otherwise, probably).
>
> What prevents wall from sending those escap
On Tue, 20 Apr 2004 07:50, Jan Minar <[EMAIL PROTECTED]> wrote:
> It seems like they should be 660, not 600, as I suggested (wall(1) and
> talkd(1) would break otherwise, probably).
What prevents wall from sending those escape sequences?
--
http://www.coker.com.au/selinux/ My NSA Security Enha
On Tue, 20 Apr 2004 07:50, Jan Minar <[EMAIL PROTECTED]> wrote:
> It seems like they should be 660, not 600, as I suggested (wall(1) and
> talkd(1) would break otherwise, probably).
What prevents wall from sending those escape sequences?
--
http://www.coker.com.au/selinux/ My NSA Security Enha
On Mon, Apr 19, 2004 at 11:18:51PM +0200, Jan Minar wrote:
It's not about Eterm, or the console.c in Linux, or the tty permissions,
it's about the bigger picture.
The bigger picture is that there are security problems and there are
security problems. The only specific problem you pointed out is
On Mon, Apr 19, 2004 at 06:40:35PM +0200, Jan Minar wrote:
> Could You tell us what _exactly_ happened? (DWN cover-story ;-)) Are
> there no testsuites/scripts to ensure basic sanity of the packages being
> built packages? Or what _exactly_ was the mistake (I'm personally
> interested in the se
Hi, Phillip!
Thank for a storm-swift reply 8-)
It seems like they should be 660, not 600, as I suggested (wall(1) and
talkd(1) would break otherwise, probably).
On Mon, Apr 19, 2004 at 05:26:25PM -0400, Phillip Hofmeister wrote:
> yes, the others are 666. Does it matter? Are they used or just
Title: www
www.VSW24.de
Ihr Hardware und Software Discounter im Internet
Große Gutschein Aktion!! Einfach Gutschein per Mail anfordern und beim Kauf von
einem Komplett PC Noch mal 15 Sparen!
Auch wenn Sie sich Ihren PC Selber zusammen Stellen.
Wir senken die
Hello
On Mon, 19 Apr 2004 08:57:39 +0200 (CEST) Tomas Pospisek wrote:
> * mysql unstable (4.0.18-4) changelog says:
>
> > Aplied fix for unprobable tempfile-symlink security problem in
> > mysqlbug reported by Shaun Colley on bugtraq on 2004-03-24.
>
> but doesn't mention the CAN numbers.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[EMAIL PROTECTED]:~$ ls -l /dev/tty0
crw---1 root root 4, 0 Jul 19 2002 /dev/tty0
[EMAIL PROTECTED]:~$ ls -l /dev/tty1
crw---1 root root 4, 1 Apr 18 21:03 /dev/tty1
[EMAIL PROTECTED]:~$ ls -l /dev/tty2
crw--
On Mon, Apr 19, 2004 at 01:07:59PM -0700, Matt Zimmerman wrote:
> On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote:
>
> > And as a part of this community, I am...
> > [doing more pointing and whining]
We are going astray. Maybe a time to rephrase...
We have security issues in Debian st
Package: makedev
Version: 2.3.1-58
Severity: important
Tags: security
Hi
Please check the permissions of /dev/tty([0-9])*, they seem to be a
free-for-all, which is no good.
Thanks to Stephen Gran for telling me who to bug.
The following patch would do, afaict:
--- /sbin/MAKEDEV.ORIG Mon Apr 1
Hello Debian-security-private (Mon, 19 Apr 2004 17:46:51 -0300)
I believe that the permissions are changed to allow a logged in user to
access that terminal. The permissions are handled and reset by the
appropriate log in service.
[EMAIL PROTECTED]:~$ ls -lh /dev/pts/3
crw---1 plhofmei tty 136, 3 Apr 19 16:47 /dev/pts/3
[EMAIL PROTECTED]:~$
Ot
On Mon, Apr 19, 2004 at 11:18:51PM +0200, Jan Minar wrote:
It's not about Eterm, or the console.c in Linux, or the tty permissions,
it's about the bigger picture.
The bigger picture is that there are security problems and there are
security problems. The only specific problem you pointed out is jus
On Mon, Apr 19, 2004 at 06:40:35PM +0200, Jan Minar wrote:
> Could You tell us what _exactly_ happened? (DWN cover-story ;-)) Are
> there no testsuites/scripts to ensure basic sanity of the packages being
> built packages? Or what _exactly_ was the mistake (I'm personally
> interested in the se
This one time, at band camp, Matt Zimmerman said:
> On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote:
> > % ssh kh
> > [EMAIL PROTECTED]'s password:
> > Linux kontryhel 2.4.26-jan #3 SMP Mon Apr 19 05:00:00 CEST 2004 i686 unknown
> > % echo 'Morning, Mister root, welcome to a jail 8-)' > /
On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote:
> And as a part of this community, I am...
> [doing more pointing and whining]
Did you miss the bit where I said that didn't help?
> Haha, I can feel the free spirit of the computer labs of the late
> sixties:
>
> /usr/src/linux/drivers
Hi, Phillip!
Thank for a storm-swift reply 8-)
It seems like they should be 660, not 600, as I suggested (wall(1) and
talkd(1) would break otherwise, probably).
On Mon, Apr 19, 2004 at 05:26:25PM -0400, Phillip Hofmeister wrote:
> yes, the others are 666. Does it matter? Are they used or just
Title: www
www.VSW24.de
Ihr Hardware und Software Discounter im Internet
Große Gutschein Aktion!! Einfach Gutschein per Mail anfordern und beim Kauf von
einem Komplett PC Noch mal 15 Sparen!
Auch wenn Sie sich Ihren PC Selber zusammen Stellen.
Wir senken die
Hello
On Mon, 19 Apr 2004 08:57:39 +0200 (CEST) Tomas Pospisek wrote:
> * mysql unstable (4.0.18-4) changelog says:
>
> > Aplied fix for unprobable tempfile-symlink security problem in
> > mysqlbug reported by Shaun Colley on bugtraq on 2004-03-24.
>
> but doesn't mention the CAN numbers.
On Mon, Apr 19, 2004 at 11:18:41AM -0700, Matt Zimmerman wrote:
> On Mon, Apr 19, 2004 at 07:51:27PM +0200, Jan Minar wrote:
>
> > Come on, Matt: Virtually all terminal emulators are vulnerable, and the
> > vulnerability is a common knowledge. The abovementioned paper was on
> > Bugtraq 2003-02-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[EMAIL PROTECTED]:~$ ls -l /dev/tty0
crw---1 root root 4, 0 Jul 19 2002 /dev/tty0
[EMAIL PROTECTED]:~$ ls -l /dev/tty1
crw---1 root root 4, 1 Apr 18 21:03 /dev/tty1
[EMAIL PROTECTED]:~$ ls -l /dev/tty2
crw--
On Mon, Apr 19, 2004 at 01:07:59PM -0700, Matt Zimmerman wrote:
> On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote:
>
> > And as a part of this community, I am...
> > [doing more pointing and whining]
We are going astray. Maybe a time to rephrase...
We have security issues in Debian st
Package: makedev
Version: 2.3.1-58
Severity: important
Tags: security
Hi
Please check the permissions of /dev/tty([0-9])*, they seem to be a
free-for-all, which is no good.
Thanks to Stephen Gran for telling me who to bug.
The following patch would do, afaict:
--- /sbin/MAKEDEV.ORIG Mon Apr 1
Hello Debian-security-private (Mon, 19 Apr 2004 17:46:51 -0300)
I believe that the permissions are changed to allow a logged in user to
access that terminal. The permissions are handled and reset by the
appropriate log in service.
[EMAIL PROTECTED]:~$ ls -lh /dev/pts/3
crw---1 plhofmei tty 136, 3 Apr 19 16:47 /dev/pts/3
[EMAIL PROTECTED]:~$
Ot
On Mon, Apr 19, 2004 at 07:51:27PM +0200, Jan Minar wrote:
> Come on, Matt: Virtually all terminal emulators are vulnerable, and the
> vulnerability is a common knowledge. The abovementioned paper was on
> Bugtraq 2003-02-24 21:02:52... Is the Security Team going to do
> something about it them
This one time, at band camp, Matt Zimmerman said:
> On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote:
> > % ssh kh
> > [EMAIL PROTECTED]'s password:
> > Linux kontryhel 2.4.26-jan #3 SMP Mon Apr 19 05:00:00 CEST 2004 i686 unknown
> > % echo 'Morning, Mister root, welcome to a jail 8-)' > /
On Mon, Apr 19, 2004 at 09:31:27PM +0200, Jan Minar wrote:
> And as a part of this community, I am...
> [doing more pointing and whining]
Did you miss the bit where I said that didn't help?
> Haha, I can feel the free spirit of the computer labs of the late
> sixties:
>
> /usr/src/linux/drivers
On Mon, Apr 19, 2004 at 09:32:47AM -0700, Matt Zimmerman wrote:
> On Mon, Apr 19, 2004 at 06:08:51PM +0200, Jan Minar wrote:
>
> > On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote:
> > > untrusted source. This is a fundamental Unix feature (or flaw). Terminal
> > > control sequence
On Mon, Apr 19, 2004 at 11:18:41AM -0700, Matt Zimmerman wrote:
> On Mon, Apr 19, 2004 at 07:51:27PM +0200, Jan Minar wrote:
>
> > Come on, Matt: Virtually all terminal emulators are vulnerable, and the
> > vulnerability is a common knowledge. The abovementioned paper was on
> > Bugtraq 2003-02-
On Sat, Apr 17, 2004 at 06:10:36PM -0400, Michael Stone wrote:
> The big problem is that the kernel situation in woody blows. There are
> too many kernels and they don't build consistently. Hopefully things
> will be better in sarge (although if you look at the number of kernels
> out there the fut
On Mon, Apr 19, 2004 at 06:08:51PM +0200, Jan Minar wrote:
> On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote:
> > untrusted source. This is a fundamental Unix feature (or flaw). Terminal
> > control sequences may be contained in the data.
>
> I've read this [1]analysis by by H D
On Mon, Apr 19, 2004 at 07:51:27PM +0200, Jan Minar wrote:
> Come on, Matt: Virtually all terminal emulators are vulnerable, and the
> vulnerability is a common knowledge. The abovementioned paper was on
> Bugtraq 2003-02-24 21:02:52... Is the Security Team going to do
> something about it them
On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote:
> untrusted source. This is a fundamental Unix feature (or flaw). Terminal
> control sequences may be contained in the data.
I've read this [1]analysis by by H D Moore. No matter how convenient
the escape sequences that allow injec
On Mon, Apr 19, 2004 at 09:32:47AM -0700, Matt Zimmerman wrote:
> On Mon, Apr 19, 2004 at 06:08:51PM +0200, Jan Minar wrote:
>
> > On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote:
> > > untrusted source. This is a fundamental Unix feature (or flaw). Terminal
> > > control sequence
On Sat, Apr 17, 2004 at 06:10:36PM -0400, Michael Stone wrote:
> The big problem is that the kernel situation in woody blows. There are
> too many kernels and they don't build consistently. Hopefully things
> will be better in sarge (although if you look at the number of kernels
> out there the fut
On Mon, Apr 19, 2004 at 06:08:51PM +0200, Jan Minar wrote:
> On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote:
> > untrusted source. This is a fundamental Unix feature (or flaw). Terminal
> > control sequences may be contained in the data.
>
> I've read this [1]analysis by by H D
On Sun, Apr 18, 2004 at 11:58:21AM -0700, Matt Zimmerman wrote:
> untrusted source. This is a fundamental Unix feature (or flaw). Terminal
> control sequences may be contained in the data.
I've read this [1]analysis by by H D Moore. No matter how convenient
the escape sequences that allow injec
On 18/04/04 17:41, Philipp Schulte wrote:
LeVA wrote:
I'm trying to exclude my mailsystem's logs from the /var/log/syslog
file. I've changed this line in /etc/syslog.conf:
*.*;auth,authpriv.none -/var/log/syslog
to:
*.*;auth,authpriv.none;mail.!* -/var/log/syslog
Try "*.*;auth,a
On 18/04/04 17:41, Philipp Schulte wrote:
LeVA wrote:
I'm trying to exclude my mailsystem's logs from the /var/log/syslog
file. I've changed this line in /etc/syslog.conf:
*.*;auth,authpriv.none -/var/log/syslog
to:
*.*;auth,authpriv.none;mail.!* -/var/log/syslog
Try "*.*;auth,authp
On Monday, April 19, 2004, at 03:06AM, Matt Zimmerman <[EMAIL PROTECTED]> wrote:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA1
>
>- --
>Debian Security Advisory DSA 492-1 [EMAIL PROTECTED]
>http://www.d
On Wed, 14 Apr 2004, Martin Schulze wrote:
> CAN-2004-0381
>
> The script mysqlbug in MySQL allows local users to overwrite
> arbitrary files via a symlink attack.
>
> CAN-2004-0388
>
> The script mysqld_multi in MySQL allows local users to overwrite
> arbitrary files via a symlink
On Monday, April 19, 2004, at 03:06AM, Matt Zimmerman <[EMAIL PROTECTED]> wrote:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA1
>
>- --
>Debian Security Advisory DSA 492-1 [EMAIL PROTECTED]
>http://www.d
On Wed, 14 Apr 2004, Martin Schulze wrote:
> CAN-2004-0381
>
> The script mysqlbug in MySQL allows local users to overwrite
> arbitrary files via a symlink attack.
>
> CAN-2004-0388
>
> The script mysqld_multi in MySQL allows local users to overwrite
> arbitrary files via a symlink
45 matches
Mail list logo