Package: linux-2.6
Version: 2.6.22-6.lenny1
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for linux-2.6.
CVE-2008-1673[0]:
| The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6
| and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic
| modules; and (b) the gxsnmp package; does not properly validate length
| values during decoding of ASN.1 BER data, which allows remote
| attackers to cause a denial of service (crash) or execute arbitrary
| code via (1) a length greater than the working buffer, which can lead
| to an unspecified overflow; (2) an oid length of zero, which can lead
| to an off-by-one error; or (3) an indefinite length for a primitive
| encoding.
Patches are linked from the mitre site but I guess you will
update to 2.6.25.5 anyway.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673
http://security-tracker.debian.net/tracker/CVE-2008-1673
--
Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
Attachment:
pgp0rdlnQ15Vm.pgp
Description: PGP signature