exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

debian.modutils.txt

debian.modutils.txt
Posted Nov 25, 2000
Site debian.org

Debian Security Advisory - A problem in the modprobe utility that can be exploited by local users to run arbitrary commands as root if the machine is running a kernel with kmod enabled has been discovered.

tags | arbitrary, kernel, local, root
systems | linux, debian
SHA-256 | d440505b7831d45ecd78c04b42425473fb9fe116ba3afa8db1cd5a0a127e52a8

debian.modutils.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory security@debian.org
http://www.debian.org/security/ Martin Schulze
November 22, 2000
- ------------------------------------------------------------------------

Package : modutils
Problem type : local buffer overflow
Debian-specific: no

Sebastian Krahmer raised an issue in modutils. In an ideal world
modprobe should trust the kernel to only pass valid parameters to
modprobe. However he has found at least one local root exploit
because high level kernel code passed unverified parameters direct
from the user to modprobe. So modprobe no longer trusts kernel input
and switches to a safemode.

This problem has been fixed in version 2.3.11-13.1 and we recommend
that you upgrade your modutils packages immediately.

This problem does not exist in the big elvis package.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.


Debian GNU/Linux 2.1 alias slink
- --------------------------------

Slink is no longer being supported by the Debian Security Team. We
highly recommend an upgrade to the current stable release.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

Potato was released for the Alpha, ARM, Intel ia32, Motorola 680x0,
PowerPC and Sun Sparc architectures. Fixes are available for all of
them and will be included in 2.2r2.

Source archives:

http://security.debian.org/dists/potato/updates/main/source/modutils_2.3.11-13.1.diff.gz
MD5 checksum: fd65f6fb5554031fe9ffa4d0e000e8b2
http://security.debian.org/dists/potato/updates/main/source/modutils_2.3.11-13.1.dsc
MD5 checksum: 2aa5e5932211f4d799ae302013410e5e

Alpha architecture:

http://security.debian.org/dists/potato/updates/main/binary-alpha/modutils_2.3.11-13.1_alpha.deb
MD5 checksum: 6e4d54d87129ff14cbb667c69454bf0f

ARM architecture:

http://security.debian.org/dists/potato/updates/main/binary-arm/modutils_2.3.11-13.1_arm.deb
MD5 checksum: 12d4bd14fbc6f5bea5e399e886fef1bd

Intel ia32 architecture:

http://security.debian.org/dists/potato/updates/main/binary-i386/modutils_2.3.11-13.1_i386.deb
MD5 checksum: 14c86f702cfed261eb65fdcecaab9c4e

Motorola 680x0 architecture:

http://security.debian.org/dists/potato/updates/main/binary-m68k/modutils_2.3.11-13.1_m68k.deb
MD5 checksum: 41579a25f953981cc3148aee14699145

PowerPC architecture:

http://security.debian.org/dists/potato/updates/main/binary-powerpc/modutils_2.3.11-13.1_powerpc.deb
MD5 checksum: b551d48435268e338e673f21f08d997d

Sun Sparc architecture:

http://security.debian.org/dists/potato/updates/main/binary-sparc/modutils_2.3.11-13.1_sparc.deb
MD5 checksum: a96dee6c2525ac409bd3c58c711133fe

These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.


Debian GNU/Linux Unstable alias woody
- -------------------------------------

This version of Debian is not yet released.

Fixes will be made available for Alpha, ARM, Intel ia32, Motorola
680x0, PowerPC, and Sun Sparc in the Debian archive over the next
several days.


For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6HDJjW5ql+IAeqTIRAvWjAJwIdgeLlvy27CVMy4Ro3VmVxm9bDgCeJZpY
PkntOBjbysKzub4o5YINekU=
=j8Ih
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close