lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <200404150336.i3F3aHvi013871@ns2.mmicman.com>
From: support at mmicman.com (Edward W. Ray)
Subject: RE: 1 patch for 1 vulnerabiliy for Linux and BSD?  gunna try and sell us a bridge now too?

If it weren't for the vulnerabilities being around for MORE THAN SIX MONTHS,
I would not have an issue.  Personally I prefer to know ASAP of any
vulnerability and have a possible workaround if a patch cannot be
immediately released.  I would think MS with its $53 billion in the bank
($51 billion now that they have paid Sun $2B), and many more resources than
the FreeBSD, Linux and OpenBSD community that they would be able to release
patches immediately instead of six months later. 

-----Original Message-----
From: Exibar [mailto:exibar@...lair.com] 
Sent: Wednesday, April 14, 2004 9:05 AM
To: full-disclosure@...ts.netsys.com; support@...cman.com
Subject: 1 patch for 1 vulnerabiliy for Linux and BSD? gunna try and sell us
a bridge now too?

Looks like Linux Math is just as bad as Microsoft math now huh?  What
happened to one patch for one vulnerability?  Looks like there is 5 in this
one......


----- Original Message -----
From: <debian-security-announce@...ts.debian.org>
To: <full-disclosure@...ts.netsys.com>
Sent: Wednesday, April 14, 2004 10:52 AM
Subject: [Full-Disclosure] [SECURITY] [DSA 479-1] New Linux 2.4.18 packages
fix local root exploit (source+alpha+i386+powerpc)


> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> - ------------------------------------------------------------------------
--
> Debian Security Advisory DSA 479-1                     security@...ian.org
> http://www.debian.org/security/                             Martin Schulze
> April 14th, 2004                        http://www.debian.org/security/faq
> - ------------------------------------------------------------------------
--
>
> Package        : kernel-source-2.4.18 kernel-image-2.4.18-1-alpha
kernel-image-2.4.18-1-i386 kernel-image-2.4.18-i386bf
kernel-patch-2.4.18-powerpc
> Vulnerability  : several vulnerabilities
> Problem-Type   : local
> Debian-specific: no
> CVE ID         : CAN-2004-0003 CAN-2004-0010 CAN-2004-0109 CAN-2004-0177
CAN-2004-0178
>
> Several serious problems have been discovered in the Linux kernel.
> This update takes care of Linux 2.4.18 for the alpha, i386 and powerpc
> architectures.  The Common Vulnerabilities and Exposures project
> identifies the following problems that will be fixed with this update:
>
> CAN-2004-0003
>
>     A vulnerability has been discovered in the R128 drive in the Linux
>     kernel which could potentially lead an attacker to gain
>     unauthorised privileges.  Alan Cox and Thomas Biege developed a
>     correction for this
>
> CAN-2004-0010
>
>     Arjan van de Ven discovered a stack-based buffer overflow in the
>     ncp_lookup function for ncpfs in the Linux kernel, which could
>     lead an attacker to gain unauthorised privileges.  Petr Vandrovec
>     developed a correction for this.
>
> CAN-2004-0109
>
>     zen-parse discovered a buffer overflow vulnerability in the
>     ISO9660 filesystem component of Linux kernel which could be abused
>     by an attacker to gain unauthorised root access.  Sebastian
>     Krahmer and Ernie Petrides developed a correction for this.
>
> CAN-2004-0177
>
>     Solar Designer discovered an information leak in the ext3 code of
>     Linux.  In a worst case an attacker could read sensitive data such
>     as cryptographic keys which would otherwise never hit disk media.
>     Theodore Ts'o developed a correction for this.
>
> CAN-2004-0178
>
>     Andreas Kies discovered a denial of service condition in the Sound
>     Blaster driver in Linux.  He also developed a correction.
>
> These problems will also be fixed by upstream in Linux 2.4.26 and
> future versions of 2.6.
>
> The following security matrix explains which kernel versions for which
> architecture are already fixed.  Kernel images in the unstable Debian
> distribution (sid) will be fixed soon.
>
> Architecture    stable (woody)     unstable (sid)    removed in sid
> source          2.4.18-14.3        2.4.25-3          --
> alpha           2.4.18-15          soon              --
> i386            2.4.18-13          soon              --
> i386bf          2.4.18-5woody8     soon              --
> powerpc         2.4.18-1woody5     2.4.25-8          2.4.22
>
> We recommend that you upgrade your kernel packages immediately, either
> with a Debian provided kernel or with a self compiled one.
>
>
> Upgrade Instructions
> - --------------------
>
> wget url
>         will fetch the file for you
> dpkg -i file.deb
>         will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
>         will update the internal database
> apt-get upgrade
>         will install corrected packages
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>
>
> Debian GNU/Linux 3.0 alias woody
> - --------------------------------
>
>   Source archives:
>
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-s
ource-2.4.18_2.4.18-14.3.dsc
>       Size/MD5 checksum:      664 a9d96cc8553c3a9085bad09e071c5814
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-s
ource-2.4.18_2.4.18-14.3.diff.gz
>       Size/MD5 checksum:    70724 4de077af92c196a6af7797d1ceea4004
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-s
ource-2.4.18_2.4.18.orig.tar.gz
>       Size/MD5 checksum: 29818323 24b4c45a04a23eb4ce465eb326a6ddf2
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-image-2.4.18-1-alpha_2.4.18-15.dsc
>       Size/MD5 checksum:      876 453a2a47eb3c6b748e75e0cb65bdd6bb
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-image-2.4.18-1-alpha_2.4.18-15.tar.gz
>       Size/MD5 checksum:    24922 f822e7999659ddcfd53dee73894afdc1
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-i386_2.4.18-13.dsc
>       Size/MD5 checksum:     1327 d37593f6e47c2b9809530eb54deeae3e
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-i386_2.4.18-13.tar.gz
>       Size/MD5 checksum:    70213 c795ba781adbd8a19202d8d986a3d0da
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-i386bf/ke
rnel-image-2.4.18-i386bf_2.4.18-5woody8.dsc
>       Size/MD5 checksum:      656 278af48a357187864c52382eeb13451d
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-i386bf/ke
rnel-image-2.4.18-i386bf_2.4.18-5woody8.tar.gz
>       Size/MD5 checksum:    26780 1f0c2eba8d3d90eef1a183f6b27f1fff
>
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-patch-2.4.18-powerpc_2.4.18-1woody5.dsc
>       Size/MD5 checksum:      713 77511f3afefed1dd71c1f73e2e036000
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-patch-2.4.18-powerpc_2.4.18-1woody5.tar.gz
>       Size/MD5 checksum:    79970 2720d9864cdd05bfc6b3bd7228ca9083
>
>   Architecture independent components:
>
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-d
oc-2.4.18_2.4.18-14.3_all.deb
>       Size/MD5 checksum:  1720106 f25772ce2d398adc25509a1ae040c76f
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-s
ource-2.4.18_2.4.18-14.3_all.deb
>       Size/MD5 checksum: 24138244 d63666d64cb91f59f2feded30ef8ea70
>
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-patch-2.4.18-powerpc_2.4.18-1woody5_all.deb
>       Size/MD5 checksum:    79722 d822eaa6adcdd517d600d62c819db7b6
>
>   Alpha architecture:
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-headers-2.4.18-1_2.4.18-15_alpha.deb
>       Size/MD5 checksum:  3363486 862f6e8f85737dd13c6ca9b760384f1a
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-headers-2.4.18-1-generic_2.4.18-15_alpha.deb
>       Size/MD5 checksum:  3512910 935ef424b222d336a642b2e7cd291e4a
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-headers-2.4.18-1-smp_2.4.18-15_alpha.deb
>       Size/MD5 checksum:  3515528 6ef19a362ec019e79fdb057fea1c9fc2
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-image-2.4.18-1-generic_2.4.18-15_alpha.deb
>       Size/MD5 checksum: 12424690 725ff255cf8941cfb5c77581d8a518d4
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-image-2.4.18-1-smp_2.4.18-15_alpha.deb
>       Size/MD5 checksum: 12801130 8d15f05215223ffcf9b11b3f682667d3
>
>   Intel IA-32 architecture:
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1_2.4.18-13_i386.deb
>       Size/MD5 checksum:  3429534 1aac0648c6f5fdee84721799806ef07a
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-386_2.4.18-13_i386.deb
>       Size/MD5 checksum:  3446290 a13776eb95c3661696f86e06a6dbac48
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-586tsc_2.4.18-13_i386.deb
>       Size/MD5 checksum:  3446482 233230438756120878a4e4b96876e61b
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-686_2.4.18-13_i386.deb
>       Size/MD5 checksum:  3446444 b5f8437bfd3279ed3f4b2f63fc2d75f5
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-686-smp_2.4.18-13_i386.deb
>       Size/MD5 checksum:  3446458 6dbbfba03667156316b184bd939d21e2
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-k6_2.4.18-13_i386.deb
>       Size/MD5 checksum:  3446350 ff76c153c3eb285b1f7b035223bc1e39
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-k7_2.4.18-13_i386.deb
>       Size/MD5 checksum:  3446324 dc2a142c75db787fdeb8a0c8e8941d1a
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-386_2.4.18-13_i386.deb
>       Size/MD5 checksum:  1154336 96f1e8262a5b11a8498d70643e87f546
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-586tsc_2.4.18-13_i386.deb
>       Size/MD5 checksum:  1154362 8b4bc947b6ab39a2deb0731f891889f3
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-686_2.4.18-13_i386.deb
>       Size/MD5 checksum:  1154358 a6e7db160b30f90711be11260128a6bb
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-686-smp_2.4.18-13_i386.deb
>       Size/MD5 checksum:  1154414 cde845ca2c7b351ce79b66965a04a748
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-k6_2.4.18-13_i386.deb
>       Size/MD5 checksum:  1154338 407aa3a3a95aa5cd8aaf5b34b306b1a4
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-k7_2.4.18-13_i386.deb
>       Size/MD5 checksum:  1154342 152aca9d4a2d7014a9834c239d754d0e
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-386_2.4.18-13_i386.deb
>       Size/MD5 checksum:     5746 9a5675e9da37620b2b3c8dc1aebfa5d0
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13_i386.deb
>       Size/MD5 checksum:     5758 325071afd718f4c0c1ba8769aba9864d
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-686_2.4.18-13_i386.deb
>       Size/MD5 checksum:     5778 212f47c992067729e8eb3da05c89c242
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13_i386.deb
>       Size/MD5 checksum:     5804 683e3a330cfde650ede99e8a6a771149
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-k6_2.4.18-13_i386.deb
>       Size/MD5 checksum:     5760 8a73b13a799928232f5028be37356ad2
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-k7_2.4.18-13_i386.deb
>       Size/MD5 checksum:     5762 be2713125a6111ab76458e07d42f3634
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-i386bf/ke
rnel-headers-2.4.18-bf2.4_2.4.18-5woody8_i386.deb
>       Size/MD5 checksum:  3411032 c97ea4fcff846ac6d0dc945d601cb97c
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-i386bf/ke
rnel-image-2.4.18-bf2.4_2.4.18-5woody8_i386.deb
>       Size/MD5 checksum:  6425640 83dc812db817e703eaa21451d048f4f7
>
>   PowerPC architecture:
>
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-headers-2.4.18_2.4.18-1woody5_powerpc.deb
>       Size/MD5 checksum:  3433044 0836b0d1fbcc5c9f440d5c75ff14f006
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-image-2.4.18-newpmac_2.4.18-1woody5_powerpc.deb
>       Size/MD5 checksum:  9456688 4473c2577d3be988993219b82ed90eda
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-image-2.4.18-powerpc_2.4.18-1woody5_powerpc.deb
>       Size/MD5 checksum: 10105472 ae0b1d57bfc8593d9aa4ad1403044607
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-image-2.4.18-powerpc-smp_2.4.18-1woody5_powerpc.deb
>       Size/MD5 checksum: 10351786 f84fe609d7192a51c4f091c1c0893680
>
>
>   These files will probably be moved into the stable distribution on
>   its next revision.
>
> - ------------------------------------------------------------------------
---------
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
> Mailing list: debian-security-announce@...ts.debian.org
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.4 (GNU/Linux)
>
> iD8DBQFAfVAvW5ql+IAeqTIRAl2ZAJ9iOjA7z+AE4QFETph/RgdpfKu3WwCfdBmo
> l3YTSWUqfR8Uz29E6qhoitY=
> =tRLO
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ