Home Blog Page 9208

Linux kernel 2.4.8-pre8 released

Author: JT Smith

Hot on the heels of pre-7, Linus has released kernel 2.4.8-pre8. Grab from kernel.org or your favorite mirror site. Changelog below.

pre8:
 - Jeff Hartmann: serverworks AGP gart unload memory leak fix
 - Marcelo Tosatti: make zone_inactive_shortage() return how big the shortage is.
 - Hugh Dickins: tidy up age_page_down()
 - Al Viro: super block handling cleanups

pre7-pre6:
 - me: better dirty balancing
 - me: sane and nice VM balancing
 - David Miller: sparc and network updates
 - Jeff Hartmann: upgrade DRM to XF86 4.1.x, drop support for 4.0.x

pre5:
 - Alan Cox: more merging
 - L.C. Chang: new SiS IDE PCI id's.
 - Maciej Rozycki: make MP table parsing more anal. Should fix broken P4 MP tables.
 - Leonard Zubkoff: merge DAC960 completion changes
 - Christoph Rohland: saner tmpfs mount-time limit behaviour (and remount)
 - me: buffer.c logic update - faster and hopefully livelock-free

pre4:
 - David Mosberger: IA64 update
 - Geert Uytterhoeven: cleanup, new atyfb
 - Marcelo Tosatti: zone aging fixes
 - me, others: limit IO requests sanely

pre3:
 - Ben Collins: 1394 updates
 - Matthew Dharm: USB storage update
 - Ion Badulescu: starfire driver update
 - VM aging cleanups

pre2:
 - Kai Germaschewski: ISDN updates
 - David Miller: sparc and network updates
 - Andrea Arcangeli, Maksim Krasnyanskiy: tasklet fixes
 - Stelian Pop: Motion Eye camera driver update
 - Jens Axboe: DAC960 update

pre1:
 - Anton Altaparmakov: NTFS error checking
 - Johannes Erdfelt: USB updates
 - OGAWA Hirofumi: FAT update
 - Alan Cox: driver + s390 update merge
 - Richard Henderson: fix alpha sigsuspend error return value
 - Marcelo Tosatti: per-zone VM shortage
 - Daniel Phillips: generic use-once optimization instead of drop-behind
 - Bjorn Wesen: Cris architecture update
 - Anton Altaparmakov: support for Windows Dynamic Disks
 - James Washer: LDT loading SMP bug fix

Category:

  • Linux

An introduction to XML data signatures

Author: JT Smith

From XML.com: “The very features that make XML so powerful for business transactions (e.g., semantically rich and structured data, text-based, and
Web-ready nature) provide both challenges and opportunities for the application of encryption and digital signature operations to
XML-encoded data. For example, in many workflow scenarios where an XML document flows stepwise between participants, and
where a digital signature implies some sort of commitment or assertion, each participant may wish to sign only that portion for which
they are responsible and assume a concomitant level of liability. Older standards for digital signatures provide neither syntax for
capturing this sort of high-granularity signature nor mechanisms for expressing which portion a principal wishes to sign.”

Category:

  • Linux

Debian security advisory: fetchmail memory corruption

Author: JT Smith

Salvatore Sanfilippo found two remotely exploitable problems in
fetchmail while doing a security audit. In both the imap and pop3 code
the input is not verified and used to store a number in an array. Since
no bounds checking is done this can be used by an attacker to write
arbitrary data in memory. An attacker can use this if we can get a user
to transfer mail from a custom imap or pop3 server he controls.

-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-071-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
August 10, 2001
- ------------------------------------------------------------------------


Package        : fetchmail
Problem type   : memory corruption
Debian-specific: no

Salvatore Sanfilippo found two remotely exploitable problems in
fetchmail while doing a security audit. In both the imap and pop3 code
the input is not verified and used to store a number in an array. Since
no bounds checking is done this can be used by an attacker to write
arbitrary data in memory. An attacker can use this if we can get a user
to transfer mail from a custom imap or pop3 server he controls.

This has been fixed in version 5.3.3-3.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    
http://security.debian.org/dists/stable/updates/main/source/fetchmail_5.3.3-3.diff.gz
      MD5 checksum: a1ba0691be21e100b10beded89813911
    
http://security.debian.org/dists/stable/updates/main/source/fetchmail_5.3.3-3.dsc
      MD5 checksum: b49e9eacda18f237ae066f085647d3f7
    
http://security.debian.org/dists/stable/updates/main/source/fetchmail_5.3.3.orig.tar.gz
      MD5 checksum: d2cffc4594ec2d36db6681b800f25e2a

  Architecture independent archives:
    
http://security.debian.org/dists/stable/updates/main/binary-all/fetchmailconf_5.3.3-3_all.deb
      MD5 checksum: 223c6590b7495a41d4743d526222bc4f

  Alpha architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/fetchmail_5.3.3-3_alpha.deb
      MD5 checksum: 75249ba9604e732e07a1b2147b6e155e

  ARM architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-arm/fetchmail_5.3.3-3_arm.deb
      MD5 checksum: 80a201b1e25ff5c301ccfd2cbfa6cd8e

  Intel IA-32 architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-i386/fetchmail_5.3.3-3_i386.deb
      MD5 checksum: 1d9e300f957b35486e2aefcff87e43c7

  Motorola 680x0 architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-m68k/fetchmail_5.3.3-3_m68k.deb
      MD5 checksum: 9bdf5c4712b7dec94f644e58635bee9b

  PowerPC architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/fetchmail_5.3.3-3_powerpc.deb
      MD5 checksum: 1f97930cf7c8c4442362d6c5f27465cb

  Sun Sparc architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/fetchmail_5.3.3-3_sparc.deb
      MD5 checksum: fb060d4e74f6f1a84823829a21d54b19

  These packages will be moved into the stable distribution on its next
  revision.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- -- 
-
----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBO3MlvajZR/ntlUftAQHvuAL/drGMIi0Vb0Xb8RxmM5fGu3Ts4AwZSwaL
sUTXib5Xdy6PMRJRjHumAt6fUI8q0ZLgXTxLZcF2rU5tV0ZmdRaNOMbOtM23BIUD
GUHweIQO+afGHpS2zGRrD4dTGya1OMnc
=3f9N
-----END PGP SIGNATURE-----

Category:

  • Linux

Debian advisory: xloadimage buffer overflow

Author: JT Smith

The version of xloadimage (a graphics files viewer for X) that was
shipped in Debian GNU/Linux 2.2 has a buffer overflow in the code that
handles FACES format images. This could be exploited by an attacker by
tricking someone into viewing a specially crafted image using xloadimage
which would allow him to execute arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-069-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
August  9, 2001
- ------------------------------------------------------------------------


Package        : xloadimage
Problem type   : buffer overflow
Debian-specific: no

The version of xloadimage (a graphics files viewer for X) that was
shipped in Debian GNU/Linux 2.2 has a buffer overflow in the code that
handles FACES format images. This could be exploited by an attacker by
tricking someone into viewing a specially crafted image using xloadimage
which would allow him to execute arbitrary code.

This problem was fixed in version 4.1-5potato1.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    
http://security.debian.org/dists/stable/updates/main/source/xloadimage_4.1-5potato1.diff.gz
      MD5 checksum: 7b920717cbf09b1cc250238817bc66c0
    
http://security.debian.org/dists/stable/updates/main/source/xloadimage_4.1-5potato1.dsc
      MD5 checksum: 2ef27a164ecd1bcf6c2e34957492497b
    
http://security.debian.org/dists/stable/updates/main/source/xloadimage_4.1.orig.tar.gz
      MD5 checksum: 7331850fc04056ab8ae6b5725d1fb3d2

  Alpha architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-alpha/xloadimage_4.1-5potato1_alpha.deb
      MD5 checksum: 69ab7a8777d520dca31271240ab374fb

  ARM architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-arm/xloadimage_4.1-5potato1_arm.deb
      MD5 checksum: 5acda93a872bbfbcd26e72534f5b11a7

  Intel IA-32 architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-i386/xloadimage_4.1-5potato1_i386.deb
      MD5 checksum: 909a84515f69e2329229aa5d5d805b7f

  Motorola 680x0 architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-m68k/xloadimage_4.1-5potato1_m68k.deb
      MD5 checksum: 0122fdd096f84bbd03df4f6a79bd3a9f

  PowerPC architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-powerpc/xloadimage_4.1-5potato1_powerpc.deb
      MD5 checksum: 16534e4be23f0917fe8483ece92a4c76

  Sun Sparc architecture:
    
http://security.debian.org/dists/stable/updates/main/binary-sparc/xloadimage_4.1-5potato1_sparc.deb
      MD5 checksum: 666443fce4e4fe474b7b1015e9ca382e

  These packages will be moved into the stable distribution on its next
  revision.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- -- 
-
----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBO3LoUajZR/ntlUftAQGPvwMAsBnrvnTcV+lZyUhClJr4S00OrKtaCbgY
8PRzBKkPl7Ny9fIOO80coJxnhVKibZEdB0FsVAbtaIaefnmVtWVobNo+6SEIpiQF
MP6cuAYygz/pVMgYRteXdw5LoRNgkRuK
=ySnS
-----END PGP SIGNATURE-----

Category:

  • Linux

Intel Itanium architecture to power new computer grid

Author: JT Smith

From a press release on Business Wire: “Intel today announced that its Itanium(TM) family of processors will be used to build a distributed scientific computing system expected to be the largest
of its kind in the world. The computing system, dubbed the “TeraGrid,” is part of a $53 million award by the National Science Foundation (NSF) to four
facilities to address complex scientific research by creating a Distributed Terascale Facility (DTF). The TeraGrid will link computers powered by more than
3,300 Intel(R) Itanium family processors. It will be capable of more than 13.6 trillion calculations per second (13.6 teraflops) and have the ability to store,
access and share more than 450 trillion bytes of information.”

Linux 2.4.8-pre7 released

Author: JT Smith

Linux kernel 2.4.8-pre7 has been released; grab it from kernel.org or your favorite mirror site. Changelog below.

pre7-pre6:
 - me: better dirty balancing
 - me: sane and nice VM balancing
 - David Miller: sparc and network updates

Category:

  • Linux

PC sales outlook grows gloomier

Author: JT Smith

ZDNet News: “When IDC released its preliminary second-quarter numbers last month, it had forecast a slight
increase in the fourth quarter of this year and a turnaround beginning in the first half of 2002.

Now, the second-quarter data looks worse than previously expected. As a result, IDC will lower
its PC market forecast and extend its expectations for a decline in the U.S. and European markets
somewhat further into 2002.

The company is now predicting that sizable recoveries of key markets, including the United
States, will not occur until 2003, though a small amount of growth is still expected for 2002.
Troubles in Japan may last longer.”

Category:

  • Open Source

IETF takes on IKE, Internet routing, Code Red

Author: JT Smith

Network World Fusion reports on the recent Internet Engineering Task Force meeting. Topics included discussions on the future of the Internet Key Exchange protocol, a large-scale demonstration of IPv6, and concern over the growth in the size of the Internet’s backbone routing tables.

Book review: John Lombardo’s Embedded Linux

Author: JT Smith

Anonymous Reader writes “LinuxDevices.com founder Rick Lehrbaum gives his impressions of the world’s first book on the subject of using Linux in embedded systems and smart devices, John Lombardo’s Embedded Linux (New Riders press, ISBN 073570998X), in this online book review. “As far as I know, it’s the first — and, at the time of this writing, the only — book published on this timely subject, thrusting it very much into the spotlight and making it a ‘must read’ for all developers (and many others) interested in exploring the subject of embedding Linux,” says Lehrbaum.”

Category:

  • Linux

Debian advisory: OpenLDAP DoS

Author: JT Smith

CERT released their advisory CA-2001-18 which lists a number of
vulnerabilities in various LDAP implementations. based on the
results of the PROTOS LDAPv3 test suite. These tests found one
problem in OpenLDAP, a free LDAP implementation that is shipped
as part of Debian GNU/Linux 2.2

-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-068-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
August  9, 2001
- ------------------------------------------------------------------------


Package        : openldap
Problem type   : remote DoS
Debian-specific: no

CERT released their advisory CA-2001-18 which lists a number of
vulnerabilities in various LDAP implementations. based on the 
results of the PROTOS LDAPv3 test suite. These tests found one
problem in OpenLDAP, a free LDAP implementation that is shipped
as part of Debian GNU/Linux 2.2.

The problem is that slapd did not handle packets with an invalid
BER length of length fields and would crash if it received those.
An attacked can use this to mount a denial of service attack
remotely.

This problem has been fixed in version 1.2.11-1, and we recommend
that you upgrade your slapd package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/openldap_1.2.12-1.dsc
      MD5 checksum: b504c90a83025dc6a916187ddabf792a
    http://security.debian.org/dists/stable/updates/main/source/openldap_1.2.12-1.tar.gz
      MD5 checksum: 651c7995d73e4450568f8c43b556b38d

  Architecture independent archives:
    http://security.debian.org/dists/stable/updates/main/binary-all/ldap-rfc_1.2.12-1_all.deb
      MD5 checksum: be2f6eb1965dc7b34149bc6518f74e58
    http://security.debian.org/dists/stable/updates/main/binary-all/libopenldap-runtime_1.2.12-1_all.deb
      MD5 checksum: 6f1031e6e83f2fbb70a01084add8a1db

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/libopenldap-dev_1.2.12-1_arm.deb
      MD5 checksum: dbcfe982fe36fb41ac27f3c3f06423b8
    http://security.debian.org/dists/stable/updates/main/binary-arm/libopenldap1_1.2.12-1_arm.deb
      MD5 checksum: d1fca5f66dbffd5240049f5b15960e6a
    http://security.debian.org/dists/stable/updates/main/binary-arm/openldap-gateways_1.2.12-1_arm.deb
      MD5 checksum: c20e3f096ec42a553b4d3b999aff4676
    http://security.debian.org/dists/stable/updates/main/binary-arm/openldap-utils_1.2.12-1_arm.deb
      MD5 checksum: aff72b6641b7b3fad9875104b0684bbe
    http://security.debian.org/dists/stable/updates/main/binary-arm/openldapd_1.2.12-1_arm.deb
      MD5 checksum: 6127f3c0fc228daedbb511f9310d3ce7

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/libopenldap-dev_1.2.12-1_alpha.deb
      MD5 checksum: 6109c93d8c9c6dd35d6d0ec97126277ahttp://security.debian.org/dists/stable/updates/main/binary-alpha/libopenldap1_1.2.12-1_alpha.deb
      MD5 checksum: f9de7d3a6fae1e7480ac38693cc54620
    http://security.debian.org/dists/stable/updates/main/binary-alpha/openldap-gateways_1.2.12-1_alpha.deb
      MD5 checksum: 01f7970379df0e81324f3c0f23d42693
    http://security.debian.org/dists/stable/updates/main/binary-alpha/openldap-utils_1.2.12-1_alpha.deb
      MD5 checksum: d3469131b4b1064abcd0fb1901ff724f
    http://security.debian.org/dists/stable/updates/main/binary-alpha/openldapd_1.2.12-1_alpha.deb
      MD5 checksum: 22bfe11e0129548734ed7d93dc5e981e

  Intel IA-32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/libopenldap-dev_1.2.12-1_i386.deb
      MD5 checksum: f38364b6f9b3a5089d58a792d0daca0a
    http://security.debian.org/dists/stable/updates/main/binary-i386/libopenldap1_1.2.12-1_i386.deb
      MD5 checksum: 00d96465ef85947015775996b44680b5
    http://security.debian.org/dists/stable/updates/main/binary-i386/openldap-gateways_1.2.12-1_i386.deb
      MD5 checksum: 3fa22bee43b35864d82fdb8e5118aeb5
    http://security.debian.org/dists/stable/updates/main/binary-i386/openldap-utils_1.2.12-1_i386.deb
      MD5 checksum: 0af27bf23ef1310c4f74f574ce11b1af
    http://security.debian.org/dists/stable/updates/main/binary-i386/openldapd_1.2.12-1_i386.deb
      MD5 checksum: fdf3b4c4fd3180470741128d06374c1e

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/libopenldap-dev_1.2.12-1_m68k.deb
      MD5 checksum: 8aed132786db3d12f611f0a3afc5a6c2
    http://security.debian.org/dists/stable/updates/main/binary-m68k/libopenldap1_1.2.12-1_m68k.deb
      MD5 checksum: b58d824141a544a3e1df5fe02ae96274
    http://security.debian.org/dists/stable/updates/main/binary-m68k/openldap-gateways_1.2.12-1_m68k.deb
      MD5 checksum: de25fa556977ad1fb5d474c6b5029427
    http://security.debian.org/dists/stable/updates/main/binary-m68k/openldap-utils_1.2.12-1_m68k.deb
      MD5 checksum: bba46b697ab1e70803f1527284344b3f
    http://security.debian.org/dists/stable/updates/main/binary-m68k/openldapd_1.2.12-1_m68k.deb
      MD5 checksum: 8bc7e0c915a28ebaab589ed5fa4dd601

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/libopenldap-dev_1.2.12-1_powerpc.deb
      MD5 checksum: 30cf58da153851a7393df83f5765e8eb
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/libopenldap1_1.2.12-1_powerpc.deb
      MD5 checksum: 9c8a2df3a2e5dbead38ce04fa82a307f
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/openldap-gateways_1.2.12-1_powerpc.deb
      MD5 checksum: 64859231a0e753b774ab6142977a8940
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/openldap-utils_1.2.12-1_powerpc.deb
      MD5 checksum: ed8d8f3309111ce8181db4bd4ce83960
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/openldapd_1.2.12-1_powerpc.deb
      MD5 checksum: 5a1bbd5a875db731ecc0d3abc8707ad9

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/libopenldap-dev_1.2.12-1_sparc.deb
      MD5 checksum: c9f0dbbe70c2b9922fa327ed77a60933
    http://security.debian.org/dists/stable/updates/main/binary-sparc/libopenldap1_1.2.12-1_sparc.deb
      MD5 checksum: c54dd0d7370ba9aec444e91ddab76d51
    http://security.debian.org/dists/stable/updates/main/binary-sparc/openldap-gateways_1.2.12-1_sparc.deb
      MD5 checksum: bf37a70edf4962d98ad4ca72d9c45a5d
    http://security.debian.org/dists/stable/updates/main/binary-sparc/openldap-utils_1.2.12-1_sparc.deb
      MD5 checksum: aed5adf8a7b4ce89c4b693591190f1d1
    http://security.debian.org/dists/stable/updates/main/binary-sparc/openldapd_1.2.12-1_sparc.deb
      MD5 checksum: 5373ae34853af6ae6d746574d3c1a9ec


  These packages will be moved into the stable distribution on its next
  revision.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- -- 
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBO3LSk6jZR/ntlUftAQGuqgL/R0JT646vRcAF/OOZ4vsV5DwfacNHvHZl
gJyN5ZNLeJi0RGMvN9//ACgQaspsK+MnSLi6XBqNkDooDZwS27ppWShtTQDgmnHD
wWe+GyQ37/dcdGvc2Ob1TFuuCuXnRDdO
=hKEv
-----END PGP SIGNATURE-----

Category:

  • Linux