Bug#805408: curl gost cipher support
Package: curl Version: 7.38.0-4+deb8u2 Severity: normal Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? Bug discribed: https://github.com/bagder/curl/issues/447 * What exactly did you do (or not do) that was effective (or ineffective)? Install Debian 8, curl change /etc/ssl/openssl.cnf to support gost then just run: curl -v https://zakupki.gov.ru * What was the outcome of this action? $ curl -v https://zakupki.gov.ru/pgz/services/upload * Hostname was NOT found in DNS cache * Trying 194.105.148.87... * Connected to zakupki.gov.ru (194.105.148.87) port 443 (#0) * successfully set certificate verify locations: * CAfile: none CApath: /etc/ssl/certs * SSLv3, TLS Unknown, Unknown (22): * SSLv3, TLS handshake, Client hello (1): * SSLv2, Unknown (22): * SSLv3, TLS handshake, Server hello (2): * SSLv2, Unknown (22): * SSLv3, TLS handshake, CERT (11): * SSLv2, Unknown (21): * SSLv3, TLS alert, Server hello (2): * error:0609E09C:digital envelope routines:PKEY_SET_TYPE:unsupported algorithm * Closing connection 0 * SSLv2, Unknown (21): * SSLv3, TLS alert, Client hello (1): curl: (35) error:0609E09C:digital envelope routines:PKEY_SET_TYPE:unsupported algorithm * What outcome did you expect instead? In curl output: SSL connection using TLSv1.0 / GOST2001-GOST89-GOST89 *** End of the template - remove these template lines *** -- System Information: Debian Release: 8.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/1 CPU core) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages curl depends on: ii libc6 2.19-18+deb8u1 ii libcurl3 7.38.0-4+deb8u2 ii zlib1g1:1.2.8.dfsg-2+b1 curl recommends no packages. curl suggests no packages. -- no debconf information
Bug#797653: apache2-mpm-itk: Cant send emails from PHP script, when install mpm-itk and exim4.
Package: apache2-mpm-itk Version: 2.4.10-10+deb8u1 Severity: normal Dear Maintainer, * What led up to the situation? Install apache2-mpm-itk and exim4. Configure apache vhost to some user and group. * What exactly did you do (or not do) that was effective (or ineffective)? Add vhost, set AssignUserID to this vhost to some new user and group. Create php script for this vhost with text: Then just open script from browser. * What was the outcome of this action? bool(False) and error in /var/log/exim4/paniclog: 2015-09-01 13:13:51 unable to set gid=1001 or uid=0 (euid=0): forcing real = effective * What outcome did you expect instead? Recieve text in browser - bool(true) To fix this error i add this settings to apache conf: LimitUIDRange 0 6000 LimitGIDRange 0 6000 -- System Information: Debian Release: 8.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages apache2-mpm-itk depends on: ii apache2 2.4.10-10+deb8u1 ii libapache2-mpm-itk 2.4.7-02-1.1 apache2-mpm-itk recommends no packages. apache2-mpm-itk suggests no packages. -- no debconf information
Bug#464945: closed by Bastian Blank [EMAIL PROTECTED] (Bug#464945: fixed in linux-2.6 2.6.24-4)
When 2.6.18-6 kernel image will be updated? 2008/2/11, Debian Bug Tracking System [EMAIL PROTECTED]: Your message dated with message-id [EMAIL PROTECTED] and subject line Bug#464945: fixed in linux-2.6 2.6.24-4 has caused the Debian Bug report #464945, regarding linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 464945: http://bugs.debian.org/cgi-bin//464945 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems -- Пересылаемое сообщение -- From: Bastian Blank [EMAIL PROTECTED] To: [EMAIL PROTECTED] Date: Mon, 11 Feb 2008 13:02:15 + Subject: Bug#464945: fixed in linux-2.6 2.6.24-4 Source: linux-2.6 Source-Version: 2.6.24-4 We believe that the bug you reported is fixed in the latest version of linux-2.6, which is due to be installed in the Debian FTP archive: linux-2.6_2.6.24-4.diff.gz to pool/main/l/linux-2.6/linux-2.6_2.6.24-4.diff.gz linux-2.6_2.6.24-4.dsc to pool/main/l/linux-2.6/linux-2.6_2.6.24-4.dsc linux-doc-2.6.24_2.6.24-4_all.deb to pool/main/l/linux-2.6/linux-doc-2.6.24_2.6.24-4_all.deb linux-headers-2.6.24-1-all-powerpc_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- headers-2.6.24-1-all-powerpc_2.6.24-4_powerpc.deb linux-headers-2.6.24-1-all_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux-headers-2.6.24-1-all_2.6.24-4_powerpc.deb linux-headers-2.6.24-1-common_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- headers-2.6.24-1-common_2.6.24-4_powerpc.deb linux-headers-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- headers-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb linux-headers-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- headers-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb linux-headers-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- headers-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb linux-headers-2.6.24-1-powerpc_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- headers-2.6.24-1-powerpc_2.6.24-4_powerpc.deb linux-image-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- image-2.6.24-1-powerpc-miboot_2.6.24-4_powerpc.deb linux-image-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- image-2.6.24-1-powerpc-smp_2.6.24-4_powerpc.deb linux-image-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- image-2.6.24-1-powerpc64_2.6.24-4_powerpc.deb linux-image-2.6.24-1-powerpc_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux- image-2.6.24-1-powerpc_2.6.24-4_powerpc.deb linux-libc-dev_2.6.24-4_powerpc.deb to pool/main/l/linux-2.6/linux-libc-dev_2.6.24-4_powerpc.deb linux-manual-2.6.24_2.6.24-4_all.deb to pool/main/l/linux-2.6/linux-manual-2.6.24_2.6.24-4_all.deb linux-patch-debian-2.6.24_2.6.24-4_all.deb to pool/main/l/linux-2.6/linux-patch-debian-2.6.24_2.6.24-4_all.deb linux-source-2.6.24_2.6.24-4_all.deb to pool/main/l/linux-2.6/linux-source-2.6.24_2.6.24-4_all.deb linux-support-2.6.24-1_2.6.24-4_all.deb to pool/main/l/linux-2.6/linux-support-2.6.24-1_2.6.24-4_all.deb linux-tree-2.6.24_2.6.24-4_all.deb to pool/main/l/linux-2.6/linux-tree-2.6.24_2.6.24-4_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Blank [EMAIL PROTECTED] (supplier of updated linux-2.6 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.7 Date: Mon, 11 Feb 2008 12:29:23 +0100 Source: linux-2.6 Binary: linux-source-2.6.24 linux-doc-2.6.24 linux-manual-2.6.24 linux-patch-debian-2.6.24 linux-tree-2.6.24 linux-support-2.6.24-1linux-libc-dev linux-headers-2.6.24-1-all linux-headers-2.6.24-1-all-alpha linux-headers-2.6.24-1-common linux-image-2.6.24-1-alpha-generic linux-headers-2.6.24-1-alpha-generic linux-image-2.6.24-1-alpha-smp linux-headers-2.6.24-1-alpha-smp linux-image-2.6.24-1-alpha-legacy linux-headers-2.6.24-1-alpha-legacy linux-headers-2.6.24-1-all-amd64 linux-image-2.6.24-1-amd64 linux-headers-2.6.24-1-amd64 linux-headers-2.6.24-1-all-arm
Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)
Ok, patch work for me. 2008/2/10, Bastian Blank [EMAIL PROTECTED]: tags 464945 patch On Sun, Feb 10, 2008 at 03:19:20AM +0300, Okulov Vitaliy wrote: Just try explot from http://www.milw0rm.com/exploits/5092 at my linux-image-2.6.18-5-686 kernel. And it works. Please backport patch from 2.6.24.1 kernel (CVE-2008-0009/10). Preliminary patch, it includes more checks then the update in 2.6.24.1. It at least fixes the exploit. Bastian -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iEYEARECAAYFAkeu52EACgkQnw66O/MvCNEfrQCfbFbdVcfe4VblSOxNOLiY9d9F GQoAoJCiusdKbBIaZOIUX5YwugsgNRwk =VaLS -END PGP SIGNATURE-
Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)
Yep, im sure. Copy of exploit: http://www.securityfocus.com/bid/27704/exploit [EMAIL PROTECTED]:~/coding/sample$ wget http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c --12:25:09-- http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c = `27704.c' Resolving downloads.securityfocus.com... 205.206.231.23 Connecting to downloads.securityfocus.com|205.206.231.23|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 6,264 (6.1K) [text/plain] 100%[=] 6,264 28.84K/s 12:25:10 (28.75 KB/s) - `27704.c' saved [6264/6264] [EMAIL PROTECTED]:~/coding/sample$ vi 27704.c [EMAIL PROTECTED]:~/coding/sample$ uname -a Linux doktor 2.6.18-6-686 #1 SMP Wed Jan 23 03:23:22 UTC 2008 i686 GNU/Linux [EMAIL PROTECTED]:~/coding/sample$ id uid=1000(doktor) gid=1000(doktor) groups=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),1000(doktor),1001(shutdown),1002(vboxusers) [EMAIL PROTECTED]:~/coding/sample$ head -n 20 27704.c /* * jessica_biel_naked_in_my_bed.c * * Dovalim z knajpy a cumim ze Wojta zas nema co robit, kura. * Gizdi, tutaj mate cosyk na hrani, kym aj totok vykeca. * Stejnak je to stare jak cyp a aj jakesyk rozbite. * * Linux vmsplice Local Root Exploit * By qaaz * * Linux 2.6.17 - 2.6.24.1 * * This is quite old code and I had to rewrite it to even compile. * It should work well, but I don't remeber original intent of all * the code, so I'm not 100% sure about it. You've been warned ;) * * -static -Wno-format */ #define _GNU_SOURCE #include stdio.h [EMAIL PROTECTED]:~/coding/sample$ gcc -static -Wno-format 27704.c -o root_expl [EMAIL PROTECTED]:~/coding/sample$ ./root_expl --- Linux vmsplice Local Root Exploit By qaaz --- [+] mmap: 0x0 .. 0x1000 [+] page: 0x0 [+] page: 0x20 [+] mmap: 0x4000 .. 0x5000 [+] page: 0x4000 [+] page: 0x4020 [+] mmap: 0x1000 .. 0x2000 [+] page: 0x1000 [+] mmap: 0xb7fc8000 .. 0xb7ffa000 [+] root [EMAIL PROTECTED]:~/coding/sample# id uid=0(root) gid=0(root) groups=20(dialout),24(cdrom),25(floppy),29(audio),44(video),46(plugdev),1000(doktor),1001(shutdown),1002(vboxusers) [EMAIL PROTECTED]:~/coding/sample# exit [EMAIL PROTECTED]:~/coding/sample$ So exploit works. 2008/2/10, Florian Weimer [EMAIL PROTECTED]: * Okulov Vitaliy: Just try explot from http://www.milw0rm.com/exploits/5092 at my linux-image-2.6.18-5-686 kernel. And it works. Please backport patch from 2.6.24.1 kernel (CVE-2008-0009/10). Milw0rm is down. Are you sure the exploit is real? The vulnerable code is not present in the 2.6.18 kernel.
Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)
Oh, just reread http://marc.info/?l=linux-kernelm=120262352612128w=2 Thereis no bugfix. Whait for Jens Axboe to fix this patch. 2008/2/10, Vitaliy Okulov [EMAIL PROTECTED]: Hm, maybe, but i read http://www.securityfocus.com/bid/27705/solution The vendor released version 2.6.24.1 to address these issues. Please see the references for more information. And then read http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1where i found only 1 bugfix for vmsplice. 2008/2/10, Florian Weimer [EMAIL PROTECTED]: * Vitaliy Okulov: Yep, im sure. Ah, okay, but I think this is not CVE-2008-0009 or CVE-2008-0010.
Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)
Hm, maybe, but i read http://www.securityfocus.com/bid/27705/solution The vendor released version 2.6.24.1 to address these issues. Please see the references for more information. And then read http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1where i found only 1 bugfix for vmsplice. 2008/2/10, Florian Weimer [EMAIL PROTECTED]: * Vitaliy Okulov: Yep, im sure. Ah, okay, but I think this is not CVE-2008-0009 or CVE-2008-0010.
Bug#426353: Re[2]: Bug#426353: mysql-server-5.0: Please add patch for this bug to stable mysql-5.0 server. http://bugs.mysql.com/bug.php?id=27513
Здравствуйте, sean. Вы писали 28 мая 2007 г., 10:32:03: hi vitaliy, On Monday 28 May 2007 08:20:18 Okulov Vitaliy wrote: Package: mysql-server-5.0 Version: 5.0.30-3 Severity: critical Justification: breaks unrelated software Please add patch for this bug to stable mysql-5.0 server. http://bugs.mysql.com/bug.php?id=27513 yes, someone has shown this one to me and i already have a patch in subversion. i'll close this bug when we make the security update. sean Ok. Good news. -- С уважением, Vitaliy mailto:[EMAIL PROTECTED]
Bug#407410: same bug again
Здравствуйте, 407410. Same bug again. I use stable debian 4.0. From 1 xen domU. Call Trace: IRQ [802a0455] softlockup_tick+0xdb/0xed [802686aa] timer_interrupt+0x38d/0x3db [80211154] handle_IRQ_event+0x2d/0x60 [802a0794] __do_IRQ+0xa4/0x105 [80283f10] _local_bh_enable+0x59/0xb3 [80266ea6] do_IRQ+0x65/0x73 [80361694] evtchn_do_upcall+0x86/0xe0 [8025cede] do_hypervisor_callback+0x1e/0x2c EOI [802063aa] hypercall_page+0x3aa/0x1000 [802063aa] hypercall_page+0x3aa/0x1000 [80267c26] raw_safe_halt+0x84/0xa8 [80264ea9] xen_idle+0x38/0x4a [80248b9b] cpu_idle+0x97/0xba From 2 Xen domU. Call Trace: IRQ [802a0455] softlockup_tick+0xdb/0xed [802686aa] timer_interrupt+0x38d/0x3db [80211154] handle_IRQ_event+0x2d/0x60 [802a0794] __do_IRQ+0xa4/0x105 [80283f10] _local_bh_enable+0x59/0xb3 [80266ea6] do_IRQ+0x65/0x73 [803616ac] evtchn_do_upcall+0x86/0xe0 [8025cede] do_hypervisor_callback+0x1e/0x2c EOI [802063aa] hypercall_page+0x3aa/0x1000 [802063aa] hypercall_page+0x3aa/0x1000 [80267c26] raw_safe_halt+0x84/0xa8 [80264ea9] xen_idle+0x38/0x4a [80248b9b] cpu_idle+0x97/0xba BUG: soft lockup detected on CPU#1! Call Trace: IRQ [802a0455] softlockup_tick+0xdb/0xed [802686aa] timer_interrupt+0x38d/0x3db [80211154] handle_IRQ_event+0x2d/0x60 [802a0794] __do_IRQ+0xa4/0x105 [80283f10] _local_bh_enable+0x59/0xb3 [80266ea6] do_IRQ+0x65/0x73 [803616ac] evtchn_do_upcall+0x86/0xe0 [8025cede] do_hypervisor_callback+0x1e/0x2c EOI [802063aa] hypercall_page+0x3aa/0x1000 [802063aa] hypercall_page+0x3aa/0x1000 [80267c26] raw_safe_halt+0x84/0xa8 [80264ea9] xen_idle+0x38/0x4a [80248b9b] cpu_idle+0x97/0xba -- С уважением, Vitaliy mailto:[EMAIL PROTECTED]
Bug#418471: [Fwd: [php-maint] patch]
Здравствуйте, sean. Вы писали 10 апреля 2007 г., 2:03:09: Package: php5 Version: 5.2.0-10 Severity: important Fixed bug #40822 (pdo_mysql does not return rowCount() on select). Patch for this bug: http://bugs.php.net/bug.php?id=40822 -- С уважением, Vitaliy mailto:[EMAIL PROTECTED]
Bug#418471: linkto CVS patch
Здравствуйте, 418471. Please add this patch http://cvs.php.net/viewvc.cgi/php-src/ext/pdo_mysql/mysql_statement.c?r1=1.48.2.14.2.3r2=1.48.2.14.2.4pathrev=PHP_5_2 to php package. -- С уважением, Vitaliy mailto:[EMAIL PROTECTED]