aboutsummaryrefslogtreecommitdiffstats
path: root/polish/security/2004/dsa-482.wml
blob: 3798d6f8abbee95b43473a375c30dadfdb58d310 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
#use wml::debian::translation-check translation="1.5" maintainer=""
#pddp arteek
<define-tag description>several vulnerabilities</define-tag>
<define-tag moreinfo>
<p>Several serious problems have been discovered in the Linux kernel.
This update takes care of Linux 2.4.17 for the PowerPC/apus and S/390
architectures.  The Common Vulnerabilities and Exposures project
identifies the following problems that will be fixed with this update:</p>

<ul>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0003">CAN-2004-0003</a>

    <p>A vulnerability has been discovered in the R128 DRI driver in the Linux
    kernel which could potentially lead an attacker to gain
    unauthorised privileges.  Alan Cox and Thomas Biege developed a
    correction for this.</p>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0010">CAN-2004-0010</a>

    <p>Arjan van de Ven discovered a stack-based buffer overflow in the
    ncp_lookup function for ncpfs in the Linux kernel, which could
    lead an attacker to gain unauthorised privileges.  Petr Vandrovec
    developed a correction for this.</p>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0109">CAN-2004-0109</a>

    <p>zen-parse discovered a buffer overflow vulnerability in the
    ISO9660 filesystem component of Linux kernel which could be abused
    by an attacker to gain unauthorised root access.  Sebastian
    Krahmer and Ernie Petrides developed a correction for this.</p>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0177">CAN-2004-0177</a>

    <p>Solar Designer discovered an information leak in the ext3 code of
    Linux.  In a worst case an attacker could read sensitive data such
    as cryptographic keys which would otherwise never hit disk media.
    Theodore Ts'o developed a correction for this.</p>

<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0178">CAN-2004-0178</a>

    <p>Andreas Kies discovered a denial of service condition in the Sound
    Blaster driver in Linux.  He also developed a correction for this.</p>

</ul>

<p>These problems are also fixed by upstream in Linux 2.4.26 and will be
fixed in Linux 2.6.6.</p>

<p>The following security matrix explains which kernel versions for which
architectures are already fixed.</p>

<table border=1 cellspacing=0 cellpadding=2>
  <tr>
    <th>Architecture</th>
    <th>stable (woody)</th>
    <th>unstable (sid)</th>
  </tr>
  <tr>
    <td>source</td>
    <td>2.4.17-1woody3</td>
    <td>2.4.25-3</td>
  </tr>
  <tr>
    <td>powerpc/apus</td>
    <td>2.4.17-5</td>
    <td>2.4.25-2</td>
  </tr>
  <tr>
    <td>s390</td>
    <td>2.4.17-2.woody.4</td>
    <td>2.4.25-2 (and probably 2.4.21-3)</td>
  </tr>
</table>

<p>We recommend that you upgrade your kernel packages immediately, either
with a Debian provided kernel or with a self compiled one.</p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2004/dsa-482.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy