Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Riku Valli
Hi How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default kernel for woody. What is state of that kernel? Regards -- Riku - Original Message - From: peace bwitchu [EMAIL PROTECTED] To: John Keimel [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Tuesday, December 02,

Re: [SECURITY] [DSA-403-1] userland can access Linux kernel memory

2003-12-03 Thread Karsten M. Self
on Wed, Dec 03, 2003 at 12:14:10AM +0100, Marcel Weber ([EMAIL PROTECTED]) wrote: Michael Stone wrote: Actually this is exactly what I meant: There are known risks and unknown risks. What we can avoid are in the first place the known risks. So the question is just if we want to take these

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Rick Moen
Quoting Riku Valli ([EMAIL PROTECTED]): How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default kernel for woody. Default _installation_ kernel. My understanding is that it's expected you'd apt-get install an image suitable to your hardware at the end of installation. --

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Rick Moen
Quoting Tim Nicholas ([EMAIL PROTECTED]): That may be expected, but I would bet good money that it's not actually the case. Not the case that people are intended to pick a hardware-suitable image to replace the installation kernel, or not the case that people do? Please note that I never

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Riku Valli
Hi At my computers this normal stock kernel is enough... So i am too lazy to compile kernel. I do it only if hardware or something need it and often i used only kernel-headers for that job. i only used Linux to different jobs and only goals are it work, it is safe and it is easy maintain. One

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Rick Moen
Quoting Riku Valli ([EMAIL PROTECTED]): At my computers this normal stock kernel is enough... So i am too lazy to compile kernel. I hope you're aware of the third alternative: precompiled images that are appropriate to your architecture and designed (unlike the installation kernel) for

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Dale Amon
On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote: This is reason why i ask what about stock kernels, because i belive i am not lonely cowboy at the middle of the no where. Debian is distrubution and Probably not... it is just that amongst a security conscious group you are likely to

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Dale Amon
On Wed, Dec 03, 2003 at 06:46:51AM -0800, Karsten M. Self wrote: Having a team that shares experience and combines talents in patching a kernel and tuning it to secure configurations is a preferable approach. While you _might_ do well on your own, the typical admin doesn't have these skills.

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread peace bwitchu
Well the thing about Debian kernel source is they incorporate more than just security patches into their source. For example if you download red hat source you get many performance patches etc. as well as any security patches that are available. To find all these patches and apply does take

Re: chkrootkit and linux 2.6

2003-12-03 Thread Miek Gieben
[On 03 Dec, @07:28, Hideki wrote in Re: chkrootkit and linux 2.6 ...] Hi, Miek, if you are using kernel 2.6-test6 or newer, maybe not worry about brk() bug. this kernel vulnerability effects under 2.4.22 and 2.6-test5. I know, thanks. I'm running test11 right now and I closely followed

Re: chkrootkit and linux 2.6

2003-12-03 Thread Jeroen van Wolffelaar
On Wed, Dec 03, 2003 at 10:05:10AM +0100, Miek Gieben wrote: I more and more start to think this is a bug in chkrootkit - on busier systems more processes are hidded than on quiet systems. Sounds to me as a race condition: number of processes changes between the two checks. Indeed, in

Re: chkrootkit and linux 2.6

2003-12-03 Thread Miek Gieben
[On 02 Dec, @20:56, David wrote in Re: chkrootkit and linux 2.6 ...] Right now chkrootkit gets lots of false positives regarding LKMs. There was a pretty thorough discussion just a couple days ago so look through the archive for the details: http://lists.debian.org/debian-security/ ah,

Re: When will kernel-image-2.4.23 be available ?

2003-12-03 Thread Phillip Hofmeister
Also, You may wish to look at the make-kpkg(kernel-package) package. It takes your stock 2.4.23 source and makes it into a nice .deb file for you. Note: This option is for those who have a working .config file. Experience in making your own config make (config|menuconfig|xconfig) is

Re: When will kernel-image-2.4.23 be available ?

2003-12-03 Thread Kjetil Kjernsmo
On Wednesday 03 December 2003 20:57, Phillip Hofmeister wrote: You may wish to look at the make-kpkg(kernel-package) package. It takes your stock 2.4.23 source and makes it into a nice .deb file for you. Note: This option is for those who have a working .config file. Experience in making

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Adam ENDRODI
On Wed, Dec 03, 2003 at 06:46:51AM -0800, Karsten M. Self wrote: on Wed, Dec 03, 2003 at 01:31:29PM +, Dale Amon ([EMAIL PROTECTED]) wrote: On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote: This is reason why i ask what about stock kernels, because i belive i am not lonely

Re: When will kernel-image-2.4.23 be available ?

2003-12-03 Thread Marc F. Neininger
At 21:26 03.12.2003 +0100, you wrote: Experience in making your own config make (config|menuconfig|xconfig) is recommended. No experience without the first try. Take about two days for reading the documentation and finding the brands on the chips your machine works with. P.S.: Before rebooting

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Rick Moen
Quoting Adam ENDRODI ([EMAIL PROTECTED]): PS: Apologies for the ranting I sent at the beginning of the other thread. I, too, didn't realize that no-one had known about the possible impacts of the kernel bug. Well, _one_ guy did. ;- -- Cheers, * Contributing

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Johannes Graumann
I'm one of those people. How do I figure out what kernel image to (AMD k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP Thoroughbred processor? How do I find out whether it supports ReiserFS, ...? Thanks for any hint to the novice. Joh On Wed, 3 Dec 2003 02:00:19 -0800 Rick Moen [EMAIL

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Kourosh
On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote: I'm one of those people. How do I figure out what kernel image to (AMD k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP Thoroughbred processor? How do I find out whether it supports ReiserFS, ...? Thanks for any hint to the novice.

Re: When will kernel-image-2.4.23 be available ?

2003-12-03 Thread Dale Amon
On Wed, Dec 03, 2003 at 10:43:44PM +0100, Marc F. Neininger wrote: No experience without the first try. Take about two days for reading the documentation and finding the brands on the chips your machine works with. Nah, just look at /proc/cpuinfo, /proc/pci (or use lspci), dmesg, etc It's

Re: do_brk-bug internals?

2003-12-03 Thread Roland Mas
Thomas Wana, 2003-12-03 00:00:18 +0100 : Now that all machines out there are fixed and save of this particular exploit :-) Hah. You bet. can anyone of you describe *exactly* what this exploit does? I've been looking at the code (mm/mm.c, around line 1045) for some time now and I can't

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Johannes Graumann
Thanks, Joh On Wed, 03 Dec 2003 14:35:51 -0800 Kourosh [EMAIL PROTECTED] wrote: On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote: I'm one of those people. How do I figure out what kernel image to (AMD k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP Thoroughbred processor? How

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Johannes Graumann
... but on a second thought: how do I find this information out ion my own and what does SMP stand for? Joh On Wed, 03 Dec 2003 14:35:51 -0800 Kourosh [EMAIL PROTECTED] wrote: On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote: I'm one of those people. How do I figure out what kernel image

Thanks to all

2003-12-03 Thread Bradley Alexander
I just wanted to take the opportunity to thank everyone in the Debian community for their hard work on the cleanup and forensic analysis of the recent system compromise. As a security engineer, I would like to say that this compromise was the cleanest, most professionally handled that I have

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Philipp Schulte
peace bwitchu wrote: Well the thing about Debian kernel source is they incorporate more than just security patches into their source. How do I find out which patches exactly are compiled in the Debian kernel source? Thanks, Phil -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Riku Valli
Hi How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default kernel for woody. What is state of that kernel? Regards -- Riku - Original Message - From: peace bwitchu [EMAIL PROTECTED] To: John Keimel [EMAIL PROTECTED]; debian-security@lists.debian.org Sent: Tuesday,

Re: [SECURITY] [DSA-403-1] userland can access Linux kernel memory

2003-12-03 Thread Karsten M. Self
on Wed, Dec 03, 2003 at 12:14:10AM +0100, Marcel Weber ([EMAIL PROTECTED]) wrote: Michael Stone wrote: Actually this is exactly what I meant: There are known risks and unknown risks. What we can avoid are in the first place the known risks. So the question is just if we want to take these

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Rick Moen
Quoting Riku Valli ([EMAIL PROTECTED]): How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default kernel for woody. Default _installation_ kernel. My understanding is that it's expected you'd apt-get install an image suitable to your hardware at the end of installation. --

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Tim Nicholas
Rick Moen wrote: Quoting Riku Valli ([EMAIL PROTECTED]): How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default kernel for woody. Default _installation_ kernel. My understanding is that it's expected you'd apt-get install an image suitable to your hardware at the end

Re: When will kernel-image-2.4.23 be available ?

2003-12-03 Thread Santiago Vila
On Tue, 2 Dec 2003, Jan H. van Gils wrote: After some research a found that kernel-image-2.4.18 is patched regarding the security problem with the kernel. I am wonder when kernel 2.4.23 wil be available as a packages for sarge ? Nobody knows for sure, but the things which should happen, in

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Rick Moen
Quoting Tim Nicholas ([EMAIL PROTECTED]): That may be expected, but I would bet good money that it's not actually the case. Not the case that people are intended to pick a hardware-suitable image to replace the installation kernel, or not the case that people do? Please note that I never

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Riku Valli
Hi At my computers this normal stock kernel is enough... So i am too lazy to compile kernel. I do it only if hardware or something need it and often i used only kernel-headers for that job. i only used Linux to different jobs and only goals are it work, it is safe and it is easy maintain. One

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Rick Moen
Quoting Riku Valli ([EMAIL PROTECTED]): At my computers this normal stock kernel is enough... So i am too lazy to compile kernel. I hope you're aware of the third alternative: precompiled images that are appropriate to your architecture and designed (unlike the installation kernel) for

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Dale Amon
On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote: This is reason why i ask what about stock kernels, because i belive i am not lonely cowboy at the middle of the no where. Debian is distrubution and Probably not... it is just that amongst a security conscious group you are likely to

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Karsten M. Self
on Wed, Dec 03, 2003 at 01:31:29PM +, Dale Amon ([EMAIL PROTECTED]) wrote: On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote: This is reason why i ask what about stock kernels, because i belive i am not lonely cowboy at the middle of the no where. Debian is distrubution and

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Dale Amon
On Wed, Dec 03, 2003 at 06:46:51AM -0800, Karsten M. Self wrote: Having a team that shares experience and combines talents in patching a kernel and tuning it to secure configurations is a preferable approach. While you _might_ do well on your own, the typical admin doesn't have these skills.

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread peace bwitchu
Well the thing about Debian kernel source is they incorporate more than just security patches into their source. For example if you download red hat source you get many performance patches etc. as well as any security patches that are available. To find all these patches and apply does take

Re: chkrootkit and linux 2.6

2003-12-03 Thread Hideki Yamane
Hi, Miek, if you are using kernel 2.6-test6 or newer, maybe not worry about brk() bug. this kernel vulnerability effects under 2.4.22 and 2.6-test5. in DSA-403, This bug has been fixed in kernel version 2.4.23 for the 2.4 tree and 2.6.0-test6 kernel tree. For Debian it has been fixed in

Re: When will kernel-image-2.4.23 be available ?

2003-12-03 Thread Phillip Hofmeister
Also, You may wish to look at the make-kpkg(kernel-package) package. It takes your stock 2.4.23 source and makes it into a nice .deb file for you. Note: This option is for those who have a working .config file. Experience in making your own config make (config|menuconfig|xconfig) is

Re: When will kernel-image-2.4.23 be available ?

2003-12-03 Thread Marc F. Neininger
At 21:26 03.12.2003 +0100, you wrote: Experience in making your own config make (config|menuconfig|xconfig) is recommended. No experience without the first try. Take about two days for reading the documentation and finding the brands on the chips your machine works with. P.S.: Before

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Johannes Graumann
I'm one of those people. How do I figure out what kernel image to (AMD k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP Thoroughbred processor? How do I find out whether it supports ReiserFS, ...? Thanks for any hint to the novice. Joh On Wed, 3 Dec 2003 02:00:19 -0800 Rick Moen [EMAIL

ziyi's key compromised or secure?

2003-12-03 Thread Santiago Garcia Mantinan
Hi! I, like many others, don't know where ziyi's key was installed and with which permisions, so... don't know if it was compromised or one can still trust this key and the signatures made with it to assure that the packages we are getting are the ones we should be getting. Can somebody with the

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Rick Moen
Quoting Adam ENDRODI ([EMAIL PROTECTED]): PS: Apologies for the ranting I sent at the beginning of the other thread. I, too, didn't realize that no-one had known about the possible impacts of the kernel bug. Well, _one_ guy did. ;- -- Cheers, * Contributing

Re: chkrootkit and linux 2.6

2003-12-03 Thread Miek Gieben
[On 02 Dec, @20:56, David wrote in Re: chkrootkit and linux 2.6 ...] Right now chkrootkit gets lots of false positives regarding LKMs. There was a pretty thorough discussion just a couple days ago so look through the archive for the details: http://lists.debian.org/debian-security/ ah,

Re: When will kernel-image-2.4.23 be available ?

2003-12-03 Thread Dale Amon
On Wed, Dec 03, 2003 at 10:43:44PM +0100, Marc F. Neininger wrote: No experience without the first try. Take about two days for reading the documentation and finding the brands on the chips your machine works with. Nah, just look at /proc/cpuinfo, /proc/pci (or use lspci), dmesg, etc It's

Re: chkrootkit and linux 2.6

2003-12-03 Thread Jeroen van Wolffelaar
On Wed, Dec 03, 2003 at 10:05:10AM +0100, Miek Gieben wrote: I more and more start to think this is a bug in chkrootkit - on busier systems more processes are hidded than on quiet systems. Sounds to me as a race condition: number of processes changes between the two checks. Indeed, in

Re: chkrootkit and linux 2.6

2003-12-03 Thread Miek Gieben
[On 03 Dec, @07:28, Hideki wrote in Re: chkrootkit and linux 2.6 ...] Hi, Miek, if you are using kernel 2.6-test6 or newer, maybe not worry about brk() bug. this kernel vulnerability effects under 2.4.22 and 2.6-test5. I know, thanks. I'm running test11 right now and I closely followed

Re: do_brk-bug internals?

2003-12-03 Thread Roland Mas
Thomas Wana, 2003-12-03 00:00:18 +0100 : Now that all machines out there are fixed and save of this particular exploit :-) Hah. You bet. can anyone of you describe *exactly* what this exploit does? I've been looking at the code (mm/mm.c, around line 1045) for some time now and I can't

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Adam ENDRODI
On Wed, Dec 03, 2003 at 06:46:51AM -0800, Karsten M. Self wrote: on Wed, Dec 03, 2003 at 01:31:29PM +, Dale Amon ([EMAIL PROTECTED]) wrote: On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote: This is reason why i ask what about stock kernels, because i belive i am not

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Johannes Graumann
Thanks, Joh On Wed, 03 Dec 2003 14:35:51 -0800 Kourosh [EMAIL PROTECTED] wrote: On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote: I'm one of those people. How do I figure out what kernel image to (AMD k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP Thoroughbred processor? How

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread Johannes Graumann
... but on a second thought: how do I find this information out ion my own and what does SMP stand for? Joh On Wed, 03 Dec 2003 14:35:51 -0800 Kourosh [EMAIL PROTECTED] wrote: On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote: I'm one of those people. How do I figure out what kernel image

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread enyc
... but on a second thought: how do I find this information out ion my own and what does SMP stand for? Not sure about your first question -- but SMP = Symettric Multi-Processor (e.g. more than 1 CPU in 1 motherboard/mothercard)... Joh [EMAIL PROTECTED]

Re: When will kernel-image-2.4.23 be available ?

2003-12-03 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote: Nah, just look at /proc/cpuinfo, /proc/pci (or use lspci), dmesg, etc It's almost all there for you. Not like the old days... lshw is fine for collecting the above information. If you need more detection try discover (Progeny) or Kudzu (Redhat) both

Re: Will 2.4.20 Source be patched for the latest kernel vulnerability?

2003-12-03 Thread elijah wright
... but on a second thought: how do I find this information out ion my own and what does SMP stand for? my understanding is that all of the post-k6/III CPUs from AMD are K7-ish. [well, the 32-bit non-AMD64 cpus anyway... if there are other quirks *I* would like to know.] you'd know if you had

Thanks to all

2003-12-03 Thread Bradley Alexander
I just wanted to take the opportunity to thank everyone in the Debian community for their hard work on the cleanup and forensic analysis of the recent system compromise. As a security engineer, I would like to say that this compromise was the cleanest, most professionally handled that I have