Re: CVE-2010-3847 fixed or not?

2011-04-13 Thread Kees Cook
Hi Arne, On Wed, Apr 13, 2011 at 11:23:10AM +0200, Arne Wichmann wrote: > So, does that mean that CVE-2010-3847 and CVE-2011-0536 can be closed in > the tracker? Yes, that is my understanding. IIUC, 2.11.2-8 fixed CVE-2011-0536 by updating the patches for CVE-2010-3847. -Kees -- Kee

Re: CVE-2010-3847 fixed or not?

2011-04-11 Thread Kees Cook
tu-branches/ubuntu/maverick/eglibc/maverick-security/view/head:/debian/patches/any/disable-ld_audit.diff > So, somebody else might still have a look at that. CVE-2010-3847 is a real mess, especially since I *think* upstream hasn't entirely fixed it. -Kees -- Kees Cook

Re: status of introducing security mechanisms in Debian

2011-02-08 Thread Kees Cook
debian.org/debian-kernel/2010/11/msg00378.html -- Kees Cook@debian.org -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://l

Re: Results of environment variable fuzzing Debian 5.05 SUID/SGIDs

2011-01-18 Thread Kees Cook
fixed > in Woody: > > http://lists.debian.org/debian-changes/2004/02/msg00029.html lbreakout2 drops setgid immediately after opening the highscore file. This crash isn't a security issue. (I've updated the bug report too.) -- Kees Cook

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-13 Thread Kees Cook
ELF, though this is really only useful when examining NX emulation. -Kees -- Kees Cook@debian.org -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20101013194238.gc4...@outflux.net

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Kees Cook
ernel's CONFIG options for PAE. The default for 32bit is _not_ PAE mode, so this is probably what is happening. -Kees -- Kees Cook@debian.org -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of &quo

Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-10 Thread Kees Cook
> system version? Your CPU may not support NX enforcement. Check your dmesg output, and your cpuflags line in /proc/cpuinfo for "nx". See https://wiki.ubuntu.com/Security/Features#nx though ignore the nx-emu notes, as that's not in De

Re: SSP & Lenny

2010-01-29 Thread Kees Cook
hich ends up being rather expensive. AT_RANDOM is the better solution and should happen automatically if the kernel supports it. The up-shot of the static canary is that usually it's string operations that overflow the stack, and it's not possible to over and past a canary with \x00 i

Re: [SECURITY] [DSA 1888-1] New openssl packages deprecate MD2 hash signatures

2009-09-15 Thread Kees Cook
updated (AFAIK, Verisign has re-signed their top-level certs with SHA-1). -Kees [1] http://marc.info/?l=openssl-cvs&m=124508133203041&w=2 -- Kees Cook@debian.org -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Re: Fixes for gaim/pidgin vulnerabilities?

2008-11-24 Thread Kees Cook
tch for this one. Actually, not even upstream has fixed this yet. :( http://people.ubuntu.com/~ubuntu-security/cve/CVE-2008-2956 -Kees -- Kees Cook@outflux.net -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe&q

Re: md5 hashes used in security announcements

2008-10-24 Thread Kees Cook
On Fri, Oct 24, 2008 at 10:35:52PM +0200, Sjors Gielen wrote: > Kees Cook wrote: > > Additionally, it doesn't matter -- it's just the md5 in the email > > announcement. The Release and Packages files for the archive have SHA1 > > and SHA256. The md5 from the annou

Re: md5 hashes used in security announcements

2008-10-24 Thread Kees Cook
es files for the archive have SHA1 and SHA256. The md5 from the announcement is almost not important, IMO -- no one should download files individually from the announcement. -- Kees Cook@outflux.net -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: [SECURITY] [DSA 1620-1] New python2.5 packages fix several vulnerabilities

2008-07-29 Thread Kees Cook
VE-2008-1679. Am I misunderstanding something? Thanks, -Kees -- Kees Cook Ubuntu Security Team -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Accepted openssh-blacklist 0.3 (source all)

2008-05-21 Thread Kees Cook
Hi, On Wed, May 21, 2008 at 05:42:43AM -0400, Simon Valiquette wrote: > Kees Cook un jour écrivit: >> On Wed, May 21, 2008 at 07:07:34AM +0200, Vincent Bernat wrote: >> >> I could be mistaken, but prior to openssl breaking, ssh-keygen stopped >> allowing dsa 2048 keys,

Re: Accepted openssh-blacklist 0.3 (source all)

2008-05-21 Thread Kees Cook
On Wed, May 21, 2008 at 07:07:34AM +0200, Vincent Bernat wrote: > OoO En cette nuit nuageuse du mercredi 21 mai 2008, vers 01:32, Kees > Cook <[EMAIL PROTECTED]> disait: > > > * Add empty DSA-2048, since they weren't any bad ones. > > How is it possible? I

Re: [Pkg-openssl-devel] [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-20 Thread Kees Cook
cklist. Is there already a svn for openssl-blacklist? If I could be added to that project ('keescook-guest' on alioth) and the Uploaders list, I'd be happy to help with the package, and help get Jamie's changes into Debian. Thanks, -Kees -- Kees Cook Ubuntu Security Team -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: openssl-blacklist & two keys per one pid

2008-05-19 Thread Kees Cook
ted in Ubuntu with the earlier releases. -- Kees Cook Ubuntu Security Team -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: openssl-blacklist & two keys per one pid

2008-05-18 Thread Kees Cook
t, but I'm missing others. I'm planning to > publish 4096 bit keys list tomorrow. I'm not going to publish complete > archives of private keys. Thanks! We can verify our lists against yours to make sure we're all on the same page. :) -Kees -- Kees Cook Ubuntu

Re: Plans to deploy openssl-blacklist in Debian? (was: Re: ssh-vulnkey and authorized_keys)

2008-05-16 Thread Kees Cook
t.com/users/hdm/tools/debian-openssl/ -- Kees Cook@outflux.net -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: cmake vs DEB_BUILD_HARDENING vs 64-bit

2008-04-14 Thread Kees Cook
be a bug in the hardening-wrapper. Cmake is doing builds in a way that wasn't expected (i.e. passing -fPIC during an executable build, which disables PIE at the compiler level, but the linker will still attempt to do it). While I think cmake is being weird, it is still a valid command line (