Re: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2014-01-14 Thread Robert Millan
ndom_yarrow; /* Then go looking for hardware */ #if defined(__i386__) && !defined(PC98) if (via_feature_rng & VIA_HAS_RNG) { *systat = random_nehemiah; } #endif } -- Robert Millan -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debia

Re: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2013-12-15 Thread Robert Millan
detected, >> unless hw.nehemiah_rng_enable or hw.ivy_rng_enable are set to zero >> to disable them. > > Remove, switch to kfreebsd 10. Either that, or backport the fix from > kfreebsd 10. I tend to favour removal. Releasing with two kernels is a PITA. What does everyone else t

Fwd: Re: Fwd: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2013-12-15 Thread Robert Millan
Forwarding to the other lists from original thread... Original Message Subject: Re: Fwd: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources) Date: Sun, 15 Dec 2013 20:53:19 +0100 From: Yves-Alexis Perez To: Robert Millan CC: t

possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2013-12-13 Thread Robert Millan
(sid): All versions in Debian already have the fixed code, which replaces random_adaptor_register() with live_entropy_source_register(), thereby registering Via and Intel chips as "entropy sources" to be post processed by Yarrow, rather than directly as &

Re: [rt.debian.org #3892] AutoReply CC: kfreebsd-8: cve-2012-0217

2012-06-21 Thread Robert Millan
ease also see my follwup on debian-bsd: >> >> https://lists.debian.org/debian-bsd/2012/06/msg00246.html > > In other words the current SVN is fine for release.  Hopefully soon, > because the exploit is due to be be demonstrated publicly tomorrow. CCing debian-security. Hopeful

Re: Bug#631161: kfreebsd-8: cve-2011-2480 info disclosure

2011-06-25 Thread Robert Millan
could be missing something. Fix uploaded to unstable and experimental. debian-security: Patch is available in r3480 in glibc-bsd SVN (attached for your convenience). -- Robert Millan Index: debian/changelog === --- debian/changelog

Install kfreebsd-i386 using squeeze/testing

2009-10-07 Thread Robert Millan
en if security support is not available, I think it'd be a good idea to have those generated. CCing debian-security (I think it's the appropiate list for this request). -- Robert Millan The DRM opt-in fallacy: "Your data belongs to us. We will decide when (and how) you may a

GCC code duplication in gcc-mingw32

2009-07-05 Thread Robert Millan
problem can be resolved in a better way in the future when DAK has better support for handling this kind of situation. -- Robert Millan The DRM opt-in fallacy: "Your data belongs to us. We will decide when (and how) you may access your data; but nobody's threatening your freedom

Re: [SECURITY] [DSA 993-1] New GnuPG packages fix broken signature check

2006-03-11 Thread Robert Millan
On Fri, Mar 10, 2006 at 09:37:25PM +0100, Martin Schulze wrote: > > For the unstable distribution (sid) this problem has been fixed in > version 1.4.2.2-1. ITYM 1.4.2-1 -- Robert Millan http://linuxstolescocode.com/";>SCO http://sco.com/";>losers http://www

Re: [SECURITY] [DSA 609-1] New atari800 packages fix local root exploit

2004-12-14 Thread Robert Millan
On Tue, Dec 14, 2004 at 05:03:01PM +0100, Martin Schulze wrote: > > Adam Zabrocki discovered multiple buffer overflows in atari800, an > Atari emulator. In order to directly access graphics hardware, one of > the affected programs is installed setuid root. A local attacker > could exploit this v

vulnerabilities in CVS?

2004-09-27 Thread Robert Millan
Hi! Are we affected by this? I haven't seen any DSA. On Mon, Sep 20, 2004 at 01:50:33PM +, FreeBSD Security Advisories wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > = > FreeBSD-SA-04:14.cvs.asc

Re: Bug#264846: telnet: Buffer Overrun by unchecked environment variables

2004-08-12 Thread Robert Millan
the > /.telnetrc letters get to). That patch is wrong. Please direct your comments at the patch for dynamic allocation I just sent instead. -- Robert Millan (Debra and Ian) (Gnu's Not (UNiplexed Information and Computing System))/\ (kernel of *(Berkeley Software Distribution)) --

Re: Bug#264846: telnet: Buffer Overrun by unchecked environment variables

2004-08-11 Thread Robert Millan
rcbuf[0] = '\0'; - strcat(rcbuf, "/.telnetrc"); - rcname = rcbuf; -} +asprintf (&rcname, "%s/.telnetrc", getenv ("HOME")); readrc(m1, m2, port, rcname); +free (rcname); } #if defined(IP_OPTIONS) && defined(HAS_IPPROTO_IP) Le

Re: ftp.gnu.org cracked

2003-08-19 Thread Robert Millan
ctness of their packages in the Debian archive. - Debian members who accessed a Debian machine from gnuftp are encouraged to change their password. -- Robert Millan "[..] but the delight and pride of Aule is in the deed of making, and in the thing made, and neither in possession nor in

Re: ftp.gnu.org cracked

2003-08-19 Thread Robert Millan
of their packages in the Debian archive. - Debian members who accessed a Debian machine from gnuftp are encouraged to change their password. -- Robert Millan "[..] but the delight and pride of Aule is in the deed of making, and in the thing made, and neither in possession nor in his own mast

Re: ftp.gnu.org cracked

2003-08-17 Thread Robert Millan
[ Moving to debian-security ] On Mon, Aug 18, 2003 at 12:35:44PM +1000, Russell Coker wrote: > On Mon, 18 Aug 2003 12:51, Robert Millan wrote: > > 2) Any unsigned sources in ftp.gnu.org could have been trojaned during > > the March-July period, and most of GNU packages have thei

Fwd: ftp.gnu.org cracked

2003-08-17 Thread Robert Millan
from debian-private: On Mon, Aug 18, 2003 at 02:51:55AM +, Robert Millan wrote: > > Hi there, > > As you might have already heard, a root compromise, which presumably has been > there for two months, was recently detected in {ftp,alpha}.gnu.org > (read http://f

Re: ftp.gnu.org cracked

2003-08-17 Thread Robert Millan
[ Moving to debian-security ] On Mon, Aug 18, 2003 at 12:35:44PM +1000, Russell Coker wrote: > On Mon, 18 Aug 2003 12:51, Robert Millan wrote: > > 2) Any unsigned sources in ftp.gnu.org could have been trojaned during > > the March-July period, and most of GNU packages have thei

Fwd: ftp.gnu.org cracked

2003-08-17 Thread Robert Millan
from debian-private: On Mon, Aug 18, 2003 at 02:51:55AM +, Robert Millan wrote: > > Hi there, > > As you might have already heard, a root compromise, which presumably has been > there for two months, was recently detected in {ftp,alpha}.gnu.org > (read http://f

possible hole in mozilla et al

2002-05-08 Thread Robert Millan
Hi, Just noticed this advisory, stating a remote vulnerability in mozilla: http://sec.greymagic.com/adv/gm001-ns/ It claims to affect 0.9.7+ but on 1.0 all it does is crashing my browser. Please CC to contact me, not subscribed. -- Robert Millan "5 years from now everyone will be ru