[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[lugbe] Kernel Backdoor (April Fool's joke)
- To: lugs at lugs.ch
- Subject: [lugbe] Kernel Backdoor (April Fool's joke)
- From: Mathias Gygax <mg at trash.net>
- Date: Thu, 29 Mar 2001 15:20:30 +0200
- Mail-Followup-To: lugbe at lugbe.ch, lugs at lugs.ch
- Organization: ENIAC
- Sender: owner-lugbe at icemark.ch
- User-Agent: Mutt/1.2.5i
ich lach mich kaputt... :*)
ok, der artikel ist auch informativ... deswegen poste ich ihn mal...
----- Forwarded message from Roman Drahtmueller <draht at suse.de> -----
Date: Thu, 29 Mar 2001 15:58:07 +0200 (MEST)
From: Roman Drahtmueller <draht at suse.de>
Subject: [suse-security] Kernel Backdoor (April Fool's joke)
To: <suse-security at suse.de>
-----BEGIN PGP SIGNED MESSAGE-----
To those involved in Linux security:
The latest release of "Linux-Magazin", a monthly German magazine that focuses
on Linux, contains an article by Mirko Dölle about security problems in the
Linux kernel.
In particular, the article argues that IP packets could be forwarded to the
address 208.47.125.33 (there is a PTR record at gary7.nsa.gov, which has an A
record back to the same address).
Many German Linux users have been calling SuSE support to learn details on
how to deal with this problem, not willing to believe that the article is an
April Fool's joke on security. None of the claims are correct, which makes a
kernel update unnecessary for this particular problem.
Now, as inclined readers of security mailing lists may have noticed, there
are indeed security problems in the Linux kernel. These problems are no
backdoors of any kind, and they are not related to the article mentioned
above. In addition, the known kernel security issues are not remotely
exploitable, which means that local shell access is needed to take advantage
of the weaknesses. The weaknesses allow for a local attacker to gain
superuser access to the system.
SuSE will provide update packages for the supported distributions 6.3, 6.4,
7.0 and 7.1 shortly that eliminate the known problems. The SuSE kernels are
standard kernels, equipped with a set of patches that introduce drivers and
many other enhancements to the standard Linux kernel. The update packages are
currently being tested and will be available and announced as soon as
possible.
As an information for those who compile and install their own kernels: The
freshly released Linux kernel version 2.2.19 fixes the known issues in the
kernel. It should run smoothly on all 6.x SuSE Linux distributions, but
please note that 2.2.19 requires update packages for the lvm and/or the
raidtools (formerly mdutils) package if lvm (logical volume manager) or the
software raid facility of the Linux kernel are used. The lvm package is
available for download from our ftp server ftp.suse.com, the raidtools
package will follow soon.
Regards,
Roman Drahtmüller,
SuSE Security
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQEVAwUBOsM8uney5gA9JdPZAQGnRggAkh+oXciCyj07rUgi0YJ4DEQVYopJRZQw
oYFcktCTC/CYXE42ZEkChlMO9UA2Op6kiFyqDnaIKo12C1555CxAJgjszQfAjPCe
1b2kxLNtY0GvibkFHjgJ5BLeh7rM3d7bMoA14HKSNXcHDQIuJEUD0Hh0ENe4fNng
qfZNHsd2EIdkjN3ncuQGjqPvy5N+se145OrEUGsOFY5Xb1KajxJhd8SlJ8+VkjTA
5tRi4NvLUZqdk1eKPvcKSkIuuv/rmSSOBEASUr/dEmy4Z8guVNW3qP6jk4HtPjYp
23yTkhZDHaYpCC7S/gMoU3pSrre0nh51W6yQx1oBOqaWZJtLSUJ+2A==
=RpeD
-----END PGP SIGNATURE-----
---------------------------------------------------------------------
To unsubscribe, e-mail: suse-security-unsubscribe at suse.com
For additional commands, e-mail: suse-security-help at suse.com
----- End forwarded message -----