[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 479-1] New Linux 2.4.18 packages fix local root exploit (source+alpha+i386+powerpc)



hi joey,
the new packages on security.d.o are way to small (1meg vs. 8meg in the
past), and seem to contain NO MODULES besides dummy.o .
i fear upgerading woody will disconnect any network connections. please
please review and pull that update.
thanks, /felix.


At 16:52 14.04.04 +0200, you wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>- --------------------------------------------------------------------------
>Debian Security Advisory DSA 479-1                     security@debian.org
>http://www.debian.org/security/                             Martin Schulze
>April 14th, 2004                        http://www.debian.org/security/faq
>- --------------------------------------------------------------------------
>
>Package        : kernel-source-2.4.18 kernel-image-2.4.18-1-alpha
kernel-image-2.4.18-1-i386 kernel-image-2.4.18-i386bf
kernel-patch-2.4.18-powerpc
>Vulnerability  : several vulnerabilities
>Problem-Type   : local
>Debian-specific: no
>CVE ID         : CAN-2004-0003 CAN-2004-0010 CAN-2004-0109 CAN-2004-0177
CAN-2004-0178
>
>Several serious problems have been discovered in the Linux kernel.
>This update takes care of Linux 2.4.18 for the alpha, i386 and powerpc
>architectures.  The Common Vulnerabilities and Exposures project
>identifies the following problems that will be fixed with this update:
>
>CAN-2004-0003
>
>    A vulnerability has been discovered in the R128 drive in the Linux
>    kernel which could potentially lead an attacker to gain
>    unauthorised privileges.  Alan Cox and Thomas Biege developed a
>    correction for this
>
>CAN-2004-0010
>
>    Arjan van de Ven discovered a stack-based buffer overflow in the
>    ncp_lookup function for ncpfs in the Linux kernel, which could
>    lead an attacker to gain unauthorised privileges.  Petr Vandrovec
>    developed a correction for this.
>
>CAN-2004-0109
>
>    zen-parse discovered a buffer overflow vulnerability in the
>    ISO9660 filesystem component of Linux kernel which could be abused
>    by an attacker to gain unauthorised root access.  Sebastian
>    Krahmer and Ernie Petrides developed a correction for this.
>
>CAN-2004-0177
>
>    Solar Designer discovered an information leak in the ext3 code of
>    Linux.  In a worst case an attacker could read sensitive data such
>    as cryptographic keys which would otherwise never hit disk media.
>    Theodore Ts'o developed a correction for this.
>
>CAN-2004-0178
>
>    Andreas Kies discovered a denial of service condition in the Sound
>    Blaster driver in Linux.  He also developed a correction.
>
>These problems will also be fixed by upstream in Linux 2.4.26 and
>future versions of 2.6.
>
>The following security matrix explains which kernel versions for which
>architecture are already fixed.  Kernel images in the unstable Debian
>distribution (sid) will be fixed soon.
>
>Architecture    stable (woody)     unstable (sid)    removed in sid
>source          2.4.18-14.3        2.4.25-3          --
>alpha           2.4.18-15          soon              --
>i386            2.4.18-13          soon              --
>i386bf          2.4.18-5woody8     soon              --
>powerpc         2.4.18-1woody5     2.4.25-8          2.4.22
>
>We recommend that you upgrade your kernel packages immediately, either
>with a Debian provided kernel or with a self compiled one.
>
>
>Upgrade Instructions
>- --------------------
>
>wget url
>        will fetch the file for you
>dpkg -i file.deb
>        will install the referenced file.
>
>If you are using the apt-get package manager, use the line for
>sources.list as given below:
>
>apt-get update
>        will update the internal database
>apt-get upgrade
>        will install corrected packages
>
>You may use an automated update by adding the resources from the
>footer to the proper configuration.
>
>
>Debian GNU/Linux 3.0 alias woody
>- --------------------------------
>
>  Source archives:
>
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-s
ource-2.4.18_2.4.18-14.3.dsc
>      Size/MD5 checksum:      664 a9d96cc8553c3a9085bad09e071c5814
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-s
ource-2.4.18_2.4.18-14.3.diff.gz
>      Size/MD5 checksum:    70724 4de077af92c196a6af7797d1ceea4004
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-s
ource-2.4.18_2.4.18.orig.tar.gz
>      Size/MD5 checksum: 29818323 24b4c45a04a23eb4ce465eb326a6ddf2
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-image-2.4.18-1-alpha_2.4.18-15.dsc
>      Size/MD5 checksum:      876 453a2a47eb3c6b748e75e0cb65bdd6bb
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-image-2.4.18-1-alpha_2.4.18-15.tar.gz
>      Size/MD5 checksum:    24922 f822e7999659ddcfd53dee73894afdc1
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-i386_2.4.18-13.dsc
>      Size/MD5 checksum:     1327 d37593f6e47c2b9809530eb54deeae3e
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-i386_2.4.18-13.tar.gz
>      Size/MD5 checksum:    70213 c795ba781adbd8a19202d8d986a3d0da
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-i386bf/ke
rnel-image-2.4.18-i386bf_2.4.18-5woody8.dsc
>      Size/MD5 checksum:      656 278af48a357187864c52382eeb13451d
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-i386bf/ke
rnel-image-2.4.18-i386bf_2.4.18-5woody8.tar.gz
>      Size/MD5 checksum:    26780 1f0c2eba8d3d90eef1a183f6b27f1fff
>
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-patch-2.4.18-powerpc_2.4.18-1woody5.dsc
>      Size/MD5 checksum:      713 77511f3afefed1dd71c1f73e2e036000
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-patch-2.4.18-powerpc_2.4.18-1woody5.tar.gz
>      Size/MD5 checksum:    79970 2720d9864cdd05bfc6b3bd7228ca9083
>
>  Architecture independent components:
>
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-d
oc-2.4.18_2.4.18-14.3_all.deb
>      Size/MD5 checksum:  1720106 f25772ce2d398adc25509a1ae040c76f
>
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-s
ource-2.4.18_2.4.18-14.3_all.deb
>      Size/MD5 checksum: 24138244 d63666d64cb91f59f2feded30ef8ea70
>
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-patch-2.4.18-powerpc_2.4.18-1woody5_all.deb
>      Size/MD5 checksum:    79722 d822eaa6adcdd517d600d62c819db7b6
>
>  Alpha architecture:
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-headers-2.4.18-1_2.4.18-15_alpha.deb
>      Size/MD5 checksum:  3363486 862f6e8f85737dd13c6ca9b760384f1a
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-headers-2.4.18-1-generic_2.4.18-15_alpha.deb
>      Size/MD5 checksum:  3512910 935ef424b222d336a642b2e7cd291e4a
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-headers-2.4.18-1-smp_2.4.18-15_alpha.deb
>      Size/MD5 checksum:  3515528 6ef19a362ec019e79fdb057fea1c9fc2
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-image-2.4.18-1-generic_2.4.18-15_alpha.deb
>      Size/MD5 checksum: 12424690 725ff255cf8941cfb5c77581d8a518d4
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/k
ernel-image-2.4.18-1-smp_2.4.18-15_alpha.deb
>      Size/MD5 checksum: 12801130 8d15f05215223ffcf9b11b3f682667d3
>
>  Intel IA-32 architecture:
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1_2.4.18-13_i386.deb
>      Size/MD5 checksum:  3429534 1aac0648c6f5fdee84721799806ef07a
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-386_2.4.18-13_i386.deb
>      Size/MD5 checksum:  3446290 a13776eb95c3661696f86e06a6dbac48
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-586tsc_2.4.18-13_i386.deb
>      Size/MD5 checksum:  3446482 233230438756120878a4e4b96876e61b
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-686_2.4.18-13_i386.deb
>      Size/MD5 checksum:  3446444 b5f8437bfd3279ed3f4b2f63fc2d75f5
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-686-smp_2.4.18-13_i386.deb
>      Size/MD5 checksum:  3446458 6dbbfba03667156316b184bd939d21e2
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-k6_2.4.18-13_i386.deb
>      Size/MD5 checksum:  3446350 ff76c153c3eb285b1f7b035223bc1e39
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-headers-2.4.18-1-k7_2.4.18-13_i386.deb
>      Size/MD5 checksum:  3446324 dc2a142c75db787fdeb8a0c8e8941d1a
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-386_2.4.18-13_i386.deb
>      Size/MD5 checksum:  1154336 96f1e8262a5b11a8498d70643e87f546
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-586tsc_2.4.18-13_i386.deb
>      Size/MD5 checksum:  1154362 8b4bc947b6ab39a2deb0731f891889f3
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-686_2.4.18-13_i386.deb
>      Size/MD5 checksum:  1154358 a6e7db160b30f90711be11260128a6bb
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-686-smp_2.4.18-13_i386.deb
>      Size/MD5 checksum:  1154414 cde845ca2c7b351ce79b66965a04a748
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-k6_2.4.18-13_i386.deb
>      Size/MD5 checksum:  1154338 407aa3a3a95aa5cd8aaf5b34b306b1a4
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-image-2.4.18-1-k7_2.4.18-13_i386.deb
>      Size/MD5 checksum:  1154342 152aca9d4a2d7014a9834c239d754d0e
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-386_2.4.18-13_i386.deb
>      Size/MD5 checksum:     5746 9a5675e9da37620b2b3c8dc1aebfa5d0
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13_i386.deb
>      Size/MD5 checksum:     5758 325071afd718f4c0c1ba8769aba9864d
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-686_2.4.18-13_i386.deb
>      Size/MD5 checksum:     5778 212f47c992067729e8eb3da05c89c242
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13_i386.deb
>      Size/MD5 checksum:     5804 683e3a330cfde650ede99e8a6a771149
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-k6_2.4.18-13_i386.deb
>      Size/MD5 checksum:     5760 8a73b13a799928232f5028be37356ad2
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/ke
rnel-pcmcia-modules-2.4.18-1-k7_2.4.18-13_i386.deb
>      Size/MD5 checksum:     5762 be2713125a6111ab76458e07d42f3634
>
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-i386bf/ke
rnel-headers-2.4.18-bf2.4_2.4.18-5woody8_i386.deb
>      Size/MD5 checksum:  3411032 c97ea4fcff846ac6d0dc945d601cb97c
>
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-i386bf/ke
rnel-image-2.4.18-bf2.4_2.4.18-5woody8_i386.deb
>      Size/MD5 checksum:  6425640 83dc812db817e703eaa21451d048f4f7
>
>  PowerPC architecture:
>
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-headers-2.4.18_2.4.18-1woody5_powerpc.deb
>      Size/MD5 checksum:  3433044 0836b0d1fbcc5c9f440d5c75ff14f006
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-image-2.4.18-newpmac_2.4.18-1woody5_powerpc.deb
>      Size/MD5 checksum:  9456688 4473c2577d3be988993219b82ed90eda
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-image-2.4.18-powerpc_2.4.18-1woody5_powerpc.deb
>      Size/MD5 checksum: 10105472 ae0b1d57bfc8593d9aa4ad1403044607
>
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/k
ernel-image-2.4.18-powerpc-smp_2.4.18-1woody5_powerpc.deb
>      Size/MD5 checksum: 10351786 f84fe609d7192a51c4f091c1c0893680
>
>
>  These files will probably be moved into the stable distribution on
>  its next revision.
>
>-
----------------------------------------------------------------------------
-----
>For apt-get: deb http://security.debian.org/ stable/updates main
>For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
>Mailing list: debian-security-announce@lists.debian.org
>Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
>
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.2.4 (GNU/Linux)
>
>iD8DBQFAfVAvW5ql+IAeqTIRAl2ZAJ9iOjA7z+AE4QFETph/RgdpfKu3WwCfdBmo
>l3YTSWUqfR8Uz29E6qhoitY=
>=tRLO
>-----END PGP SIGNATURE-----
>
>
>-- 
>To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
>with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
>
>



Reply to: