Re: [SECURITY] [DSA 641-1] New playmidi packages fix local root exploit

2005-06-16 Thread b.molinar sagat
ciao Ci, vieni su domani sera? Se hai problem con il trasporto fammi sapere. ti aspetto. Beppuz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

[polarcom.com #21732] AutoReply: [SECURITY] [DSA 641-1] New playmidi packages fix local root exploit

2005-01-17 Thread Polaris - Sysadmin
Greetings, This message has been automatically generated in response to the creation of a trouble ticket regarding: "[SECURITY] [DSA 641-1] New playmidi packages fix local root exploit", a summary of which appears below. There is no need to reply to this message right now. Y

Re: local root exploit

2005-01-11 Thread A.J. Loonstra
Robert Vangel wrote: It says it did exploit but it didn't... A. Try doing something that would require root (eg.. mount something, create a file in /, etc) Yep I tried that but I don't have root permissions [EMAIL PROTECTED]:~$ ./a.out [+] SLAB cleanup child 1 VMAs 9019 [+] moved stack bfffe0

Re: local root exploit

2005-01-11 Thread Robert Vangel
A.J. Loonstra wrote: I tried modifying the exploit not to use /dev/shm... but this is wat happens: ~$ ./a.out [+] SLAB cleanup child 1 VMAs 287 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xc500 - 0xc9d17000 Wait... | [+] race won maps=6768 e

Re: local root exploit

2005-01-11 Thread Brett Parker
On Tue, Jan 11, 2005 at 10:18:46AM +0100, A.J. Loonstra wrote: > I tried modifying the exploit not to use /dev/shm... but this is wat > happens: > > ~$ ./a.out > > [+] SLAB cleanup > child 1 VMAs 287 > [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 > [+] vmalloc area 0xc5

Re: local root exploit

2005-01-11 Thread A.J. Loonstra
I tried modifying the exploit not to use /dev/shm... but this is wat happens: ~$ ./a.out [+] SLAB cleanup child 1 VMAs 287 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xc500 - 0xc9d17000 Wait... | [+] race won maps=6768 expanded VMA (0xbfffc0

Re: local root exploit

2005-01-11 Thread Christophe Chisogne
A.J. Loonstra a écrit : I tried modifying the exploit not to use /dev/shm... but this is wat happens: (...) It says it did exploit but it didn't... I just modify it the same way (without /dev/shm tmpfs-mounted). And it worked as expected (uid 0 and root access). Perhaps you inadvertly entered the

Re: local root exploit

2005-01-11 Thread Dariush Pietrzak
What about this: ./elflbl [+] SLAB cleanup child 1 VMAs 87 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xe040 - 0xd000 [-] FAILED: uselib (Exec format error) this is on woody, with vulnerable kernel (2.4.28 with ow1 and vserver), I do

Re: local root exploit

2005-01-10 Thread Johann Glaser
Hi! > Christophe Chisogne a écrit : > > Vladislav Kurz a écrit : > > > >> mount -t tmpfs tmpfs /dev/shm > > > > With or without that, it fails with > > Oups, I'm sorry, it really works, with /dev/shm mounted :( > but for about 10% of executions. (yes, 'again' was the keyword) > > > Tested with

Re: local root exploit

2005-01-10 Thread Christophe Chisogne
Christophe Chisogne a écrit : Vladislav Kurz a écrit : mount -t tmpfs tmpfs /dev/shm With or without that, it fails with Oups, I'm sorry, it really works, with /dev/shm mounted :( but for about 10% of executions. (yes, 'again' was the keyword) Tested with 2.4.27-1-686 (2004-09-03) compiled with gcc

Re: local root exploit

2005-01-10 Thread Boris B. Zhmurov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, Carlos Tirado. On 10.01.2005 18:36 you said the following: | [+] SLAB cleanup | child 1 VMAs 65406 | [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 | [+] vmalloc area 0xd400 - 0xe7ff1000 | Wait... - | [+] race won

Re: local root exploit

2005-01-10 Thread Carlos Tirado
[+] SLAB cleanup child 1 VMAs 65406 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xd400 - 0xe7ff1000 Wait... - [+] race won maps=51294 expanded VMA (0xbfffc000-0xe000) [!] try to exploit 0xd4915000 [+] gate modified ( 0xffec90f4 0x0804ec00

Re: local root exploit

2005-01-10 Thread Christophe Chisogne
Vladislav Kurz a écrit : mount -t tmpfs tmpfs /dev/shm With or without that, it fails with "[-] FAILED: uselib (Cannot allocate memory) Killed" Tested with 2.4.27-1-686 (2004-09-03) compiled with gcc (GCC) 3.3.5 (Debian 1:3.3.5-5) and 2.4.27 kernel headers (-I/usr/src/kernel-source-2.4.27/include/)

Re: local root exploit

2005-01-10 Thread Boris B. Zhmurov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, Carlos Tirado. On 10.01.2005 18:16 you said the following: | [EMAIL PROTECTED]:~/security$ ./elflbl | | [+] SLAB cleanup | child 1 VMAs 605 | [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 | [+] vmalloc area 0xd400 -

Re: local root exploit

2005-01-10 Thread Carlos Tirado
[EMAIL PROTECTED]:~/security$ ./elflbl [+] SLAB cleanup child 1 VMAs 64801 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xd400 - 0xe7ff1000 [-] FAILED: open lib (/dev/shm/_elf_lib not writable?) (Permission denied) Killed [EMAIL PROTECTED]:~/securit

Re: local root exploit

2005-01-10 Thread Vladislav Kurz
On Monday 10 of January 2005 15:29, Jacques Lav!gnotte wrote: > On Mon, 10 Jan 2005 15:19:33 +0100 > > Vladislav Kurz <[EMAIL PROTECTED]> wrote: > > mount -t tmpfs tmpfs /dev/shm > > Only root can do that. But it can be already mounted, and the exploit can be modified to use any writeable directo

Re: local root exploit

2005-01-10 Thread Jacques Lav!gnotte
On Mon, 10 Jan 2005 15:19:33 +0100 Vladislav Kurz <[EMAIL PROTECTED]> wrote: > mount -t tmpfs tmpfs /dev/shm Only root can do that. Jacques -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: local root exploit

2005-01-10 Thread Vladislav Kurz
On Fri, 07 Jan 2005 23:55:15 +0100, Arnaud Loonstra <[EMAIL PROTECTED]> wrote: > Just tried the newly found exploits on a Woody system, it doesn't work... > I get: > [+] SLAB cleanup > child 1 VMAs 143 > [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 > [+] vmalloc area 0xc

Re: local root exploit

2005-01-07 Thread Louis Guerin
Ok, more data. [...] > Sarge, 2.6.7-1-686 and sid, 2.6.9 custom kernel (same behavior): > > $ ./elflbl > > child 1 VMAs 0 > [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 > [+] vmalloc area 0xc800 - 0xcfc32000 > > (at this point it eats all the cpu and ram it can g

Re: local root exploit

2005-01-07 Thread Louis Guerin
In-Reply-To=<[EMAIL PROTECTED]> Same behaviour here; custom 2.4.27 uml kernel on woody. $ ./elflbl [+] SLAB cleanup child 1 VMAs 70 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xc6c0 - 0xcd5dd000 [-] FAILED: open lib (/dev/shm/_elf_lib not writab

Re: local root exploit

2005-01-07 Thread Guanghui Yu
Hi It doesn't work on Woody + kernel 2.4.26 (with /dev/shm ) too. ./a.out [+] SLAB cleanup child 1 VMAs 65527 child 2 VMAs 65527 child 3 VMAs 2896 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0x3e80 - 0xbcd09000 Wait... - [-] FAILED:

local root exploit

2005-01-07 Thread Arnaud Loonstra
Just tried the newly found exploits on a Woody system, it doesn't work... I get: [+] SLAB cleanup child 1 VMAs 143 [+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80 [+] vmalloc area 0xc500 - 0xc9d17000 [-] FAILED: open lib (/dev/shm/_elf_lib not writable?) (No such file or

Re: [SECURITY] [DSA 609-1] New atari800 packages fix local root exploit

2004-12-15 Thread Hideki Yamane
Hi, "Tue, 14 Dec 2004 14:07:51 -0500", "Joey Hess" "Re: [SECURITY] [DSA 609-1] New atari800 packages fix local root exploit" >> For the unstable distribution (sid) these problems will be fixed soon. > >Actually, according to >http://marc.thea

Re: [SECURITY] [DSA 609-1] New atari800 packages fix local root exploit

2004-12-14 Thread Robert Millan
On Tue, Dec 14, 2004 at 05:03:01PM +0100, Martin Schulze wrote: > > Adam Zabrocki discovered multiple buffer overflows in atari800, an > Atari emulator. In order to directly access graphics hardware, one of > the affected programs is installed setuid root. A local attacker > could exploit this v

Re: [SECURITY] [DSA 609-1] New atari800 packages fix local root exploit

2004-12-14 Thread Petr Stehlik
Martin Schulze píše v Út 14. 12. 2004 v 17:03 +0100: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > - -- > Debian Security Advisory DSA 609-1 [EMAIL PROTECTED] > http://www.debian.org/security/

Re: [SECURITY] [DSA 609-1] New atari800 packages fix local root exploit

2004-12-14 Thread Joey Hess
Martin Schulze wrote: > For the stable distribution (woody) these problems have been fixed in > version 1.2.2-1woody3. > > For the unstable distribution (sid) these problems will be fixed soon. Actually, according to http://marc.theaimsgroup.com/?l=bugtraq&m=110149441815270&w=2 upstream version 1

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 06:40:35PM +0200, Jan Minar wrote: > Could You tell us what _exactly_ happened? (DWN cover-story ;-)) Are > there no testsuites/scripts to ensure basic sanity of the packages being > built packages? Or what _exactly_ was the mistake (I'm personally > interested in the se

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-19 Thread Matt Zimmerman
On Mon, Apr 19, 2004 at 06:40:35PM +0200, Jan Minar wrote: > Could You tell us what _exactly_ happened? (DWN cover-story ;-)) Are > there no testsuites/scripts to ensure basic sanity of the packages being > built packages? Or what _exactly_ was the mistake (I'm personally > interested in the se

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-19 Thread Jan Minar
On Sat, Apr 17, 2004 at 06:10:36PM -0400, Michael Stone wrote: > The big problem is that the kernel situation in woody blows. There are > too many kernels and they don't build consistently. Hopefully things > will be better in sarge (although if you look at the number of kernels > out there the fut

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-19 Thread Jan Minar
On Sat, Apr 17, 2004 at 06:10:36PM -0400, Michael Stone wrote: > The big problem is that the kernel situation in woody blows. There are > too many kernels and they don't build consistently. Hopefully things > will be better in sarge (although if you look at the number of kernels > out there the fut

Re: BF kernels (was: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386))

2004-04-18 Thread Horst Pflugstaedt
On Sat, Apr 17, 2004 at 10:00:23AM -0400, Michael Stone wrote: > On Thu, Apr 15, 2004 at 08:19:24PM +1000, Joshua Goodall wrote: > >In other words, people are ready to pounce, and that short gap of time > >after server installation and before installing patched code cannot be > >considered "safe"

Re: BF kernels (was: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386))

2004-04-18 Thread Horst Pflugstaedt
On Sat, Apr 17, 2004 at 10:00:23AM -0400, Michael Stone wrote: > On Thu, Apr 15, 2004 at 08:19:24PM +1000, Joshua Goodall wrote: > >In other words, people are ready to pounce, and that short gap of time > >after server installation and before installing patched code cannot be > >considered "safe"

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-17 Thread Michael Stone
The big problem is that the kernel situation in woody blows. There are too many kernels and they don't build consistently. Hopefully things will be better in sarge (although if you look at the number of kernels out there the future seems grim) but woody will always have slow & painful kernel updat

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-17 Thread Michael Stone
The big problem is that the kernel situation in woody blows. There are too many kernels and they don't build consistently. Hopefully things will be better in sarge (although if you look at the number of kernels out there the future seems grim) but woody will always have slow & painful kernel update

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-17 Thread Jean Christophe ANDRÉ
Le samedi 17 avril 2004 à 10h01 (-0400), Michael Stone écrivait : > >When you have time, could you please tell people how could that happen? > It's a mistake, it happens. Off course! And I don't ask to blame anybody! I'm just curious to know the details, so it may be usefull to me too when I'm co

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-17 Thread Michael Stone
On Thu, Apr 15, 2004 at 03:30:58PM +0700, Jean Christophe ANDRÉ wrote: When you have time, could you please tell people how could that happen? It's a mistake, it happens. Mike Stone

Re: BF kernels (was: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386))

2004-04-17 Thread Michael Stone
On Thu, Apr 15, 2004 at 08:19:24PM +1000, Joshua Goodall wrote: In other words, people are ready to pounce, and that short gap of time after server installation and before installing patched code cannot be considered "safe". Quite the opposite. Note that if you're doing a network install you c

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-17 Thread Jean Christophe ANDRÉ
Le samedi 17 avril 2004 Ã 10h01 (-0400), Michael Stone Ãcrivait : > >When you have time, could you please tell people how could that happen? > It's a mistake, it happens. Off course! And I don't ask to blame anybody! I'm just curious to know the details, so it may be usefull to me too when I'm co

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-17 Thread Michael Stone
On Wed, Apr 14, 2004 at 05:08:42PM -0400, Phillip Hofmeister wrote: If you checked the reference CVE numbers you should be able to tell when the exposure first occurred (or close to it). No, the number has absolutely no relation to the date the vulnerability was discovered. Mike Stone

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-17 Thread Michael Stone
On Thu, Apr 15, 2004 at 03:30:58PM +0700, Jean Christophe ANDRÉ wrote: When you have time, could you please tell people how could that happen? It's a mistake, it happens. Mike Stone -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: BF kernels (was: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386))

2004-04-17 Thread Michael Stone
On Thu, Apr 15, 2004 at 08:19:24PM +1000, Joshua Goodall wrote: In other words, people are ready to pounce, and that short gap of time after server installation and before installing patched code cannot be considered "safe". Quite the opposite. Note that if you're doing a network install you can

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-17 Thread Michael Stone
On Wed, Apr 14, 2004 at 05:08:42PM -0400, Phillip Hofmeister wrote: If you checked the reference CVE numbers you should be able to tell when the exposure first occurred (or close to it). No, the number has absolutely no relation to the date the vulnerability was discovered. Mike Stone -- To UNSUBS

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-16 Thread Adrian 'Dagurashibanipal' von Bidder
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Friday 16 April 2004 08.20, David R wrote: > 1) At first, didn't realize I needed to uncomment the word prompt in > lilo.conf (though I figured this one out before posting to the > group). You can just hold down the shift or control key when booti

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-16 Thread David R
Thanks for the many replies. Just for the record, I thought I'd type out what I had to go through to get everything to work: 1) At first, didn't realize I needed to uncomment the word prompt in lilo.conf (though I figured this one out before posting to the group). 2) The reason I received the erro

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-16 Thread Adrian 'Dagurashibanipal' von Bidder
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Friday 16 April 2004 08.20, David R wrote: > 1) At first, didn't realize I needed to uncomment the word prompt in > lilo.conf (though I figured this one out before posting to the > group). You can just hold down the shift or control key when booti

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread David R
Thanks for the many replies. Just for the record, I thought I'd type out what I had to go through to get everything to work: 1) At first, didn't realize I needed to uncomment the word prompt in lilo.conf (though I figured this one out before posting to the group). 2) The reason I received the erro

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread Peter Cordes
On Thu, Apr 15, 2004 at 09:33:32PM +0200, David R wrote: > Yes, any ideas how to fix this? I'm a newbie, so a bit new to Linux. When I > installed this 2.4.18 package, it blew up my network card, so I am unable to > get the new, fixed package. I thought about using apt-get remove to get rid > of th

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread Florian Weimer
"David R" <[EMAIL PROTECTED]> writes: > What do I do? Do I use apt-get remove to get rid of the patched kernel? Do I > do something else? You could look at /var/cache/apt/archives and see if there is an old version of the kernel package. Try to install it using "dpkg -i". -- Current mail filte

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread David R
Yes, any ideas how to fix this? I'm a newbie, so a bit new to Linux. When I installed this 2.4.18 package, it blew up my network card, so I am unable to get the new, fixed package. I thought about using apt-get remove to get rid of the patched kernel, but somehow this seemed ungood to me, so I trie

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread Peter Cordes
On Thu, Apr 15, 2004 at 09:33:32PM +0200, David R wrote: > Yes, any ideas how to fix this? I'm a newbie, so a bit new to Linux. When I > installed this 2.4.18 package, it blew up my network card, so I am unable to > get the new, fixed package. I thought about using apt-get remove to get rid > of th

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread Florian Weimer
"David R" <[EMAIL PROTECTED]> writes: > What do I do? Do I use apt-get remove to get rid of the patched kernel? Do I > do something else? You could look at /var/cache/apt/archives and see if there is an old version of the kernel package. Try to install it using "dpkg -i". -- Current mail filte

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread David R
Yes, any ideas how to fix this? I'm a newbie, so a bit new to Linux. When I installed this 2.4.18 package, it blew up my network card, so I am unable to get the new, fixed package. I thought about using apt-get remove to get rid of the patched kernel, but somehow this seemed ungood to me, so I trie

Re: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-15 Thread Adrian 'Dagurashibanipal' von Bidder
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 15 April 2004 11.56, Tim Nicholas wrote: > On 04/15/04 20:05, Michelle Konzack wrote: > > Question: What about the Bootfloppies ? > If I recall correctly it is assumed that users will not run on the > boot floppy kernels after the initia

Re: BF kernels (was: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386))

2004-04-15 Thread Joshua Goodall
On Thu, 15 Apr 2004 07:56 pm, Tim Nicholas wrote: > If I recall correctly it is assumed that users will not run on the > boot floppy kernels after the initial system installation. They are > expected to install a more appropriate kernel after finishing the > install. > > As such there will be no pa

Re: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-15 Thread Tim Nicholas
On 04/15/04 20:05, Michelle Konzack wrote: Question: What about the Bootfloppies ? Many bad Debian $USER using the bf24 as there standard Kernel and do not replace it with an other kernel flavor... The Boot-Disks are not updated since 21.05.2002... Greetings Michelle If I recall c

Re: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-15 Thread Adrian 'Dagurashibanipal' von Bidder
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 15 April 2004 11.56, Tim Nicholas wrote: > On 04/15/04 20:05, Michelle Konzack wrote: > > Question: What about the Bootfloppies ? > If I recall correctly it is assumed that users will not run on the > boot floppy kernels after the initia

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-15 Thread Jean Christophe ANDRÉ
Hi Guys! Le mercredi 14 avril 2004 à 23h58 (+0200), Martin Schulze écrivait : > An unfortunate build error caused some of the kernel packages in > DSA 479-1 to be broken. When you have time, could you please tell people how could that happen? Doesn't packaging process has any check for co

Re: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-15 Thread Michelle Konzack
Hello all, last night I have gotten this Message: Am 2004-04-14 23:58:00, schrieb Martin Schulze: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >- -- >Debian Security Advisory DSA 479-2 [EMAIL PROTECT

Re: BF kernels (was: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386))

2004-04-15 Thread Joshua Goodall
On Thu, 15 Apr 2004 07:56 pm, Tim Nicholas wrote: > If I recall correctly it is assumed that users will not run on the > boot floppy kernels after the initial system installation. They are > expected to install a more appropriate kernel after finishing the > install. > > As such there will be no pa

Re: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-15 Thread Tim Nicholas
On 04/15/04 20:05, Michelle Konzack wrote: Question: What about the Bootfloppies ? Many bad Debian $USER using the bf24 as there standard Kernel and do not replace it with an other kernel flavor... The Boot-Disks are not updated since 21.05.2002... Greetings Michelle If I recall correctly it

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread Jan Lühr
Greetings, Am Mittwoch, 14. April 2004 23:08 schrieb Phillip Hofmeister: > If you checked the reference CVE numbers you should be able to tell when > the exposure first occurred (or close to it). > Thanks :) - I have already been there. Are there any, no longer classified information about the fi

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-15 Thread Jean Christophe ANDRÉ
Hi Guys! Le mercredi 14 avril 2004 Ã 23h58 (+0200), Martin Schulze Ãcrivait : > An unfortunate build error caused some of the kernel packages in > DSA 479-1 to be broken. When you have time, could you please tell people how could that happen? Doesn't packaging process has any check for co

Re: [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-15 Thread Michelle Konzack
Hello all, last night I have gotten this Message: Am 2004-04-14 23:58:00, schrieb Martin Schulze: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >- -- >Debian Security Advisory DSA 479-2 [EMAIL PROTECT

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-15 Thread Jan Lühr
Greetings, Am Mittwoch, 14. April 2004 23:08 schrieb Phillip Hofmeister: > If you checked the reference CVE numbers you should be able to tell when > the exposure first occurred (or close to it). > Thanks :) - I have already been there. Are there any, no longer classified information about the fi

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Carl Witty
On Wed, 2004-04-14 at 07:52, Martin Schulze wrote: > Several serious problems have been discovered in the Linux kernel. > This update takes care of Linux 2.4.18 for the alpha, i386 and powerpc > architectures. The Common Vulnerabilities and Exposures project > identifies the following problems tha

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Carl Witty
On Wed, 2004-04-14 at 07:52, Martin Schulze wrote: > Several serious problems have been discovered in the Linux kernel. > This update takes care of Linux 2.4.18 for the alpha, i386 and powerpc > architectures. The Common Vulnerabilities and Exposures project > identifies the following problems tha

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-14 Thread Lior Kaplan
ECTED]> To: "Debian Security Announcements" Sent: Wednesday, April 14, 2004 11:58 PM Subject: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386) > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > - -

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Philippe Troin
> yada... > > > > Thanks for doing so ;) Anyway, this wasn't the intetention of my > post. My point is, that five local root exploits at once are a > little bit scary, as far as there are no patch- days for debian > ;). Actually: CAN-2004-0003 (the R128 DRI bounds chec

Re: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386)

2004-04-14 Thread Lior Kaplan
ECTED]> To: "Debian Security Announcements" <[EMAIL PROTECTED]> Sent: Wednesday, April 14, 2004 11:58 PM Subject: [SECURITY] [DSA 479-2] New Linux 2.4.18 packages fix local root exploit (i386) &g

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Phillip Hofmeister
If you checked the reference CVE numbers you should be able to tell when the exposure first occurred (or close to it). On Wed, 14 Apr 2004 at 04:30:16PM -0400, Jan L?hr wrote: > Greetings,.. > > Am Mittwoch, 14. April 2004 20:57 schrieben Sie: > > Jan L?hr <[EMAIL PROTECTED]> writes: > > > Greeti

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Jan Lühr
Greetings,.. Am Mittwoch, 14. April 2004 20:57 schrieben Sie: > Jan Lühr <[EMAIL PROTECTED]> writes: > > Greetings, > Okay... This is the result of a cursory check, do your homework, yada, > yada... > Thanks for doing so ;) Anyway, this wasn't the intetention of my post. My point is, that five l

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Philippe Troin
> yada... > > > > Thanks for doing so ;) Anyway, this wasn't the intetention of my > post. My point is, that five local root exploits at once are a > little bit scary, as far as there are no patch- days for debian > ;). Actually: CAN-2004-0003 (the R128 DRI bounds chec

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Phillip Hofmeister
If you checked the reference CVE numbers you should be able to tell when the exposure first occurred (or close to it). On Wed, 14 Apr 2004 at 04:30:16PM -0400, Jan L?hr wrote: > Greetings,.. > > Am Mittwoch, 14. April 2004 20:57 schrieben Sie: > > Jan L?hr <[EMAIL PROTECTED]> writes: > > > Greeti

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Philippe Troin
Jan Lühr <[EMAIL PROTECTED]> writes: > Greetings, > > Am Mittwoch, 14. April 2004 16:52 schrieb Martin Schulze: > > -- > > Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] > > http://www.debian.org/sec

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Jan Lühr
Greetings,.. Am Mittwoch, 14. April 2004 20:57 schrieben Sie: > Jan Lühr <[EMAIL PROTECTED]> writes: > > Greetings, > Okay... This is the result of a cursory check, do your homework, yada, > yada... > Thanks for doing so ;) Anyway, this wasn't the intetention of my post. My point is, that five l

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Henning Bredenkötter
Hello Martin Schulze, am Mittwoch, 14. April 2004 um 16:52 schrieben Sie: MS> -- MS> Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] MS> ... MS> ---

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Philippe Troin
Jan Lühr <[EMAIL PROTECTED]> writes: > Greetings, > > Am Mittwoch, 14. April 2004 16:52 schrieb Martin Schulze: > > -- > > Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] > > http://www.debian.org/sec

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Rune Nordbøe Skillingstad
On Wed, 2004-04-14 at 16:52, Martin Schulze wrote: > - -- > Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Martin Schulze > April 14th, 200

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Martin Geier
On Wed, Apr 14, 2004 at 04:52:31PM +0200, Martin Schulze wrote: > Package: kernel-source-2.4.18 kernel-image-2.4.18-1-alpha > kernel-image-2.4.18-1-i386 kernel-image-2.4.18-i386bf > kernel-patch-2.4.18-powerpc > Vulnerability : several vulnerabilities > Problem-Type : local > Debian-sp

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Felix Odenkirchen
hi joey, the new packages on security.d.o are way to small (1meg vs. 8meg in the past), and seem to contain NO MODULES besides dummy.o . i fear upgerading woody will disconnect any network connections. please please review and pull that update. thanks, /felix. At 16:52 14.04.04 +0200, you wrote:

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Henning Bredenkötter
Hello Martin Schulze, am Mittwoch, 14. April 2004 um 16:52 schrieben Sie: MS> -- MS> Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] MS> ... MS> ---

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Jan Lühr
Greetings, Am Mittwoch, 14. April 2004 16:52 schrieb Martin Schulze: > -- > Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Martin Schulze

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Rune Nordbøe Skillingstad
On Wed, 2004-04-14 at 16:52, Martin Schulze wrote: > - -- > Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Martin Schulze > April 14th, 200

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Martin Geier
On Wed, Apr 14, 2004 at 04:52:31PM +0200, Martin Schulze wrote: > Package: kernel-source-2.4.18 kernel-image-2.4.18-1-alpha > kernel-image-2.4.18-1-i386 kernel-image-2.4.18-i386bf kernel-patch-2.4.18-powerpc > Vulnerability : several vulnerabilities > Problem-Type : local > Debian-speci

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Felix Odenkirchen
hi joey, the new packages on security.d.o are way to small (1meg vs. 8meg in the past), and seem to contain NO MODULES besides dummy.o . i fear upgerading woody will disconnect any network connections. please please review and pull that update. thanks, /felix. At 16:52 14.04.04 +0200, you wrote:

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)

2004-04-14 Thread Jan Lühr
Greetings, Am Mittwoch, 14. April 2004 16:52 schrieb Martin Schulze: > -- > Debian Security Advisory DSA 479-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Martin Schulze

Re: [ [Dri-devel] XFree86 local root exploit]

2004-02-14 Thread LeVA
2004. február 12. 19:45 dátummal Ryan Underwood ezt írta: Thanks a lot! Daniel -- LeVA

Re: [ [Dri-devel] XFree86 local root exploit]

2004-02-14 Thread LeVA
2004. február 12. 19:45 dátummal Ryan Underwood ezt írta: Thanks a lot! Daniel -- LeVA -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

[ [Dri-devel] XFree86 local root exploit]

2004-02-12 Thread Ryan Underwood
Thu, 12 Feb 2004 13:44:09 +0100 Subject: [Dri-devel] XFree86 local root exploit To: DRI developer's list User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040113 There's a buffer overflow in XFree86 allowing local attackers to gain root privileges. Here's the pa

[ [Dri-devel] XFree86 local root exploit]

2004-02-12 Thread Ryan Underwood
Thu, 12 Feb 2004 13:44:09 +0100 Subject: [Dri-devel] XFree86 local root exploit To: DRI developer's list <[EMAIL PROTECTED]> User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040113 There's a buffer overflow in XFree86 allowing local attackers to gain root privil

Re: Local root exploit with kmod and modutils > 2.1.121

2000-11-13 Thread Wichert Akkerman
Previously André Dahlqvist wrote: > Keith Owens, the author of modutils, just sent this security annoucement > to the linux-kernel mailing list: Looking into this I found some nice issues: 1. potato is not vulnerable 2. the patch from Keith is wrong I'll have fix for woody later today. Wichert.

Re: Local root exploit with kmod and modutils > 2.1.121

2000-11-13 Thread Wichert Akkerman
Previously André Dahlqvist wrote: > Keith Owens, the author of modutils, just sent this security annoucement > to the linux-kernel mailing list: Looking into this I found some nice issues: 1. potato is not vulnerable 2. the patch from Keith is wrong I'll have fix for woody later today. Wichert.