Linux Security
Linux Security
Linux Security

Debian: New resmgr packages fix unauthorised access

Date 29 Apr 2006
Posted By LinuxSecurity Advisories
Updated package.

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1047-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
April 30th, 2006              
- --------------------------------------------------------------------------

Package        : resmgr
Vulnerability  : programming error
Problem type   : local
Debian-specific: no

A problem has been discovered in resmgr, a resource manager library
daemon and PAM module, that allows local users to bypass access
control rules and open any USB device when access to one device was

the old stable distribution (woody) does not contain resmgr packages.

For the stable distribution (sarge) this problem has been fixed in
version 1.0-2sarge2.

For the unstable distribution (sid) this problem has been fixed in
version 1.0-4.

We recommend that you upgrade your resmgr package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      614 9b90463431b3893f727ff080df0a5239
      Size/MD5 checksum:     7976 52d70d8e9684ab80719d806d9088d067
      Size/MD5 checksum:    40970 c5d77b35fc30a7bead00ea2951c19a2f

  Alpha architecture:
      Size/MD5 checksum:     4428 f20cb82298535193b9629c4811251192
      Size/MD5 checksum:     8870 d0c6a5a4f04fa2258280cb4b6d60c0c9
      Size/MD5 checksum:    36690 efb631c58b56a16c40d1a3152e9d4f8f

  AMD64 architecture:
      Size/MD5 checksum:     4422 0ca68e35b937773dfa3b89dd8945281b
      Size/MD5 checksum:     8194 0317c1c3ed93bd13aebe521949d4fda5
      Size/MD5 checksum:    33304 2275f781d337907b87ad31d0779d1a0c

  ARM architecture:
      Size/MD5 checksum:     4428 13adf84fa226c83cf36ddc7014a413b8
      Size/MD5 checksum:     7058 8d0e935b6ca4425174490e7523bb86ab
      Size/MD5 checksum:    29328 21f2b68f8dc44be7b4304f66f3d080ae

  Intel IA-32 architecture:
      Size/MD5 checksum:     4422 852f6d951e3ed2fd4e8740e2bc8b1fa6
      Size/MD5 checksum:    25906 0f7831ec7b0382a6962cbddecfa2ef5c
      Size/MD5 checksum:    41224 d6df916c394f4c826b4d9e75434a261a

  Intel IA-64 architecture:
      Size/MD5 checksum:     4414 39ad0549329d2dd0810d580c65629012
      Size/MD5 checksum:    10196 031bad7b1ba99e6b7e337b7f506321c3
      Size/MD5 checksum:    41210 47ba589e9bf7ee09769447dd759dbc0e

  HP Precision architecture:
      Size/MD5 checksum:     4436 4f9e59f8941fd2160002dfaac94ae756
      Size/MD5 checksum:     8676 8a92ed14b17e608d4607b626af2948f4
      Size/MD5 checksum:    33612 2dbb5089a1e6a6bcd8a202687ab2c826

  Motorola 680x0 architecture:
      Size/MD5 checksum:     4444 752f2adf6c0c977de1a346d8326ceea4
      Size/MD5 checksum:     7238 1674a58df5be5d7d7a46dd8eca880b0d
      Size/MD5 checksum:    28882 5c65ca27ee2816344da1a0e9289a9414

  Big endian MIPS architecture:
      Size/MD5 checksum:     4434 49b9292653d918bf6f94809322d8fb48
      Size/MD5 checksum:     7778 5246faae2986c92f6edf9b0cb518ed85
      Size/MD5 checksum:    34712 4817872f485e1b6c402caa019bf3fa62

  Little endian MIPS architecture:
      Size/MD5 checksum:     4432 c783ce5980d7d0b22aa1c69a66d89456
      Size/MD5 checksum:     7814 a5226c77b764b2c79b32211a67a0580e
      Size/MD5 checksum:    34668 00efd90689cce6b0874622a32ad687cd

  PowerPC architecture:
      Size/MD5 checksum:     4442 2cb12a62b99ee151de15f62b01cd3cdb
      Size/MD5 checksum:     9474 4d7589e21c6604b0915cdcb13f64d66b
      Size/MD5 checksum:    36228 c7bb76f8eb7e08c1db19eb2b061e9a01

  IBM S/390 architecture:
      Size/MD5 checksum:     4428 1f49b31b45334df4f298c96ce35b9b7d
      Size/MD5 checksum:     8302 6065fe66f9b5a41bbf6e7d23b4090d32
      Size/MD5 checksum:    33282 b3b1443b323c144c8f72e0b37f70546d

  Sun Sparc architecture:
      Size/MD5 checksum:     4434 27815a5a67681abf7ac81c6998de4c73
      Size/MD5 checksum:     7296 9974ef49ba0e43ab99d4892876a66f0d
      Size/MD5 checksum:    29564 b7255b27b8ea036030ffe9487b8da09d

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"64","type":"x","order":"1","pct":76.19,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"13","type":"x","order":"2","pct":15.48,"resources":[]},{"id":"181","title":"Hardly ever","votes":"7","type":"x","order":"3","pct":8.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.