Linux Security
    Linux Security
    Linux Security

    Debian: New resmgr packages fix unauthorised access

    Posted By
    Updated package.

    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1047-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    April 30th, 2006              
    - --------------------------------------------------------------------------
    Package        : resmgr
    Vulnerability  : programming error
    Problem type   : local
    Debian-specific: no
    A problem has been discovered in resmgr, a resource manager library
    daemon and PAM module, that allows local users to bypass access
    control rules and open any USB device when access to one device was
    the old stable distribution (woody) does not contain resmgr packages.
    For the stable distribution (sarge) this problem has been fixed in
    version 1.0-2sarge2.
    For the unstable distribution (sid) this problem has been fixed in
    version 1.0-4.
    We recommend that you upgrade your resmgr package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      614 9b90463431b3893f727ff080df0a5239
          Size/MD5 checksum:     7976 52d70d8e9684ab80719d806d9088d067
          Size/MD5 checksum:    40970 c5d77b35fc30a7bead00ea2951c19a2f
      Alpha architecture:
          Size/MD5 checksum:     4428 f20cb82298535193b9629c4811251192
          Size/MD5 checksum:     8870 d0c6a5a4f04fa2258280cb4b6d60c0c9
          Size/MD5 checksum:    36690 efb631c58b56a16c40d1a3152e9d4f8f
      AMD64 architecture:
          Size/MD5 checksum:     4422 0ca68e35b937773dfa3b89dd8945281b
          Size/MD5 checksum:     8194 0317c1c3ed93bd13aebe521949d4fda5
          Size/MD5 checksum:    33304 2275f781d337907b87ad31d0779d1a0c
      ARM architecture:
          Size/MD5 checksum:     4428 13adf84fa226c83cf36ddc7014a413b8
          Size/MD5 checksum:     7058 8d0e935b6ca4425174490e7523bb86ab
          Size/MD5 checksum:    29328 21f2b68f8dc44be7b4304f66f3d080ae
      Intel IA-32 architecture:
          Size/MD5 checksum:     4422 852f6d951e3ed2fd4e8740e2bc8b1fa6
          Size/MD5 checksum:    25906 0f7831ec7b0382a6962cbddecfa2ef5c
          Size/MD5 checksum:    41224 d6df916c394f4c826b4d9e75434a261a
      Intel IA-64 architecture:
          Size/MD5 checksum:     4414 39ad0549329d2dd0810d580c65629012
          Size/MD5 checksum:    10196 031bad7b1ba99e6b7e337b7f506321c3
          Size/MD5 checksum:    41210 47ba589e9bf7ee09769447dd759dbc0e
      HP Precision architecture:
          Size/MD5 checksum:     4436 4f9e59f8941fd2160002dfaac94ae756
          Size/MD5 checksum:     8676 8a92ed14b17e608d4607b626af2948f4
          Size/MD5 checksum:    33612 2dbb5089a1e6a6bcd8a202687ab2c826
      Motorola 680x0 architecture:
          Size/MD5 checksum:     4444 752f2adf6c0c977de1a346d8326ceea4
          Size/MD5 checksum:     7238 1674a58df5be5d7d7a46dd8eca880b0d
          Size/MD5 checksum:    28882 5c65ca27ee2816344da1a0e9289a9414
      Big endian MIPS architecture:
          Size/MD5 checksum:     4434 49b9292653d918bf6f94809322d8fb48
          Size/MD5 checksum:     7778 5246faae2986c92f6edf9b0cb518ed85
          Size/MD5 checksum:    34712 4817872f485e1b6c402caa019bf3fa62
      Little endian MIPS architecture:
          Size/MD5 checksum:     4432 c783ce5980d7d0b22aa1c69a66d89456
          Size/MD5 checksum:     7814 a5226c77b764b2c79b32211a67a0580e
          Size/MD5 checksum:    34668 00efd90689cce6b0874622a32ad687cd
      PowerPC architecture:
          Size/MD5 checksum:     4442 2cb12a62b99ee151de15f62b01cd3cdb
          Size/MD5 checksum:     9474 4d7589e21c6604b0915cdcb13f64d66b
          Size/MD5 checksum:    36228 c7bb76f8eb7e08c1db19eb2b061e9a01
      IBM S/390 architecture:
          Size/MD5 checksum:     4428 1f49b31b45334df4f298c96ce35b9b7d
          Size/MD5 checksum:     8302 6065fe66f9b5a41bbf6e7d23b4090d32
          Size/MD5 checksum:    33282 b3b1443b323c144c8f72e0b37f70546d
      Sun Sparc architecture:
          Size/MD5 checksum:     4434 27815a5a67681abf7ac81c6998de4c73
          Size/MD5 checksum:     7296 9974ef49ba0e43ab99d4892876a66f0d
          Size/MD5 checksum:    29564 b7255b27b8ea036030ffe9487b8da09d
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"125","title":"Yes","votes":"47","type":"x","order":"1","pct":83.93,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":16.07,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.