[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

unsubscribe



On Wed, Apr 14, 2004 at 05:20:49PM +0200, Martin Schulze wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> - --------------------------------------------------------------------------
> Debian Security Advisory DSA 481-1                     security@debian.org
> http://www.debian.org/security/                             Martin Schulze
> April 14th, 2004                        http://www.debian.org/security/faq
> - --------------------------------------------------------------------------
> 
> Package        : kernel-image-2.4.17-ia64
> Vulnerability  : several vulnerabilities
> Problem-Type   : local
> Debian-specific: no
> CVE ID         : CAN-2004-0003 CAN-2004-0010 CAN-2004-0109 CAN-2004-0177 CAN-2004-0178
> 
> Several serious problems have been discovered in the Linux kernel.
> This update takes care of Linux 2.4.17 for the IA-64 architecture.
> The Common Vulnerabilities and Exposures project identifies the
> following problems that will be fixed with this update:
> 
> CAN-2004-0003
> 
>     A vulnerability has been discovered in the R128 drive in the Linux
>     kernel which could potentially lead an attacker to gain
>     unauthorised privileges.  Alan Cox and Thomas Biege developed a
>     correction for this
> 
> CAN-2004-0010
> 
>     Arjan van de Ven discovered a stack-based buffer overflow in the
>     ncp_lookup function for ncpfs in the Linux kernel, which could
>     lead an attacker to gain unauthorised privileges.  Petr Vandrovec
>     developed a correction for this.
> 
> CAN-2004-0109
> 
>     zen-parse discovered a buffer overflow vulnerability in the
>     ISO9660 filesystem component of Linux kernel which could be abused
>     by an attacker to gain unauthorised root access.  Sebastian
>     Krahmer and Ernie Petrides developed a correction for this.
> 
> CAN-2004-0177
> 
>     Solar Designer discovered an information leak in the ext3 code of
>     Linux.  In a worst case an attacker could read sensitive data such
>     as cryptographic keys which would otherwise never hit disk media.
>     Theodore Ts'o developed a correction for this.
> 
> CAN-2004-0178
> 
>     Andreas Kies discovered a denial of service condition in the Sound
>     Blaster driver in Linux.  He also developed a correction for this.
> 
> These problems will also be fixed by upstream in Linux 2.4.26 and
> future versions of 2.6.
> 
> For the stable distribution (woody) these problems have been fixed in
> version 011226.17 for Linux 2.4.17.
> 
> For the unstable distribution (sid) these problems have been fixed in
> version 2.4.25-5 for Linux 2.4.25 and in version 2.6.5-1 for Linux
> 2.6.5.
> 
> We recommend that you upgrade your kernel packages immediately, either
> with a Debian provided kernel or with a self compiled one.
> 
> 
> Upgrade Instructions
> - --------------------
> 
> wget url
>         will fetch the file for you
> dpkg -i file.deb
>         will install the referenced file.
> 
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
> 
> apt-get update
>         will update the internal database
> apt-get upgrade
>         will install corrected packages
> 
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
> 
> 
> Debian GNU/Linux 3.0 alias woody
> - --------------------------------
> 
>   Source archives:
> 
>     http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.17.dsc
>       Size/MD5 checksum:      736 2f8bdbd5d82c972dee55ae3eb3051ebf
>     http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.17.tar.gz
>       Size/MD5 checksum: 25407685 a4f251ad4275ee197e3f5b3aa76c45c9
> 
>   Architecture independent components:
> 
>     http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.17_all.deb
>       Size/MD5 checksum: 24730726 c6133857bb4423ecec496517f212da70
> 
>   Intel IA-64 architecture:
> 
>     http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.17_ia64.deb
>       Size/MD5 checksum:  3635930 ee77880f4ae85e0850115788e0bc18e6
>     http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.17_ia64.deb
>       Size/MD5 checksum:  7020714 942615101e2eb34833f53fa6eb7713d2
>     http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.17_ia64.deb
>       Size/MD5 checksum:  7169180 04d65a0c0eae8b01488383ada809a936
>     http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.17_ia64.deb
>       Size/MD5 checksum:  7011536 5388a3be55dfe67c54355d6974f26400
>     http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.17_ia64.deb
>       Size/MD5 checksum:  7161438 7fca8b5dbaf833e15810acde2ad678de
> 
> 
>   These files will probably be moved into the stable distribution on
>   its next revision.
> 
> - ---------------------------------------------------------------------------------
> For apt-get: deb http://security.debian.org/ stable/updates main
> For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
> Mailing list: debian-security-announce@lists.debian.org
> Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.4 (GNU/Linux)
> 
> iD8DBQFAfVbRW5ql+IAeqTIRAjssAJ9w4ihJWW7GnXsc0rBSqRIEH0eOYACdF3MJ
> iH4gpw77WONx4DS/zPRcrKQ=
> =KaRw
> -----END PGP SIGNATURE-----
> 
> 
> -- 
> To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

-- 
------------------------
rainer@centerzone.ch



Reply to: