diff options
Diffstat (limited to 'polish/security/2004/dsa-482.wml')
-rw-r--r-- | polish/security/2004/dsa-482.wml | 81 |
1 files changed, 81 insertions, 0 deletions
diff --git a/polish/security/2004/dsa-482.wml b/polish/security/2004/dsa-482.wml new file mode 100644 index 00000000000..3798d6f8abb --- /dev/null +++ b/polish/security/2004/dsa-482.wml @@ -0,0 +1,81 @@ +#use wml::debian::translation-check translation="1.5" maintainer="" +#pddp arteek +<define-tag description>several vulnerabilities</define-tag> +<define-tag moreinfo> +<p>Several serious problems have been discovered in the Linux kernel. +This update takes care of Linux 2.4.17 for the PowerPC/apus and S/390 +architectures. The Common Vulnerabilities and Exposures project +identifies the following problems that will be fixed with this update:</p> + +<ul> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0003">CAN-2004-0003</a> + + <p>A vulnerability has been discovered in the R128 DRI driver in the Linux + kernel which could potentially lead an attacker to gain + unauthorised privileges. Alan Cox and Thomas Biege developed a + correction for this.</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0010">CAN-2004-0010</a> + + <p>Arjan van de Ven discovered a stack-based buffer overflow in the + ncp_lookup function for ncpfs in the Linux kernel, which could + lead an attacker to gain unauthorised privileges. Petr Vandrovec + developed a correction for this.</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0109">CAN-2004-0109</a> + + <p>zen-parse discovered a buffer overflow vulnerability in the + ISO9660 filesystem component of Linux kernel which could be abused + by an attacker to gain unauthorised root access. Sebastian + Krahmer and Ernie Petrides developed a correction for this.</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0177">CAN-2004-0177</a> + + <p>Solar Designer discovered an information leak in the ext3 code of + Linux. In a worst case an attacker could read sensitive data such + as cryptographic keys which would otherwise never hit disk media. + Theodore Ts'o developed a correction for this.</p> + +<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0178">CAN-2004-0178</a> + + <p>Andreas Kies discovered a denial of service condition in the Sound + Blaster driver in Linux. He also developed a correction for this.</p> + +</ul> + +<p>These problems are also fixed by upstream in Linux 2.4.26 and will be +fixed in Linux 2.6.6.</p> + +<p>The following security matrix explains which kernel versions for which +architectures are already fixed.</p> + +<table border=1 cellspacing=0 cellpadding=2> + <tr> + <th>Architecture</th> + <th>stable (woody)</th> + <th>unstable (sid)</th> + </tr> + <tr> + <td>source</td> + <td>2.4.17-1woody3</td> + <td>2.4.25-3</td> + </tr> + <tr> + <td>powerpc/apus</td> + <td>2.4.17-5</td> + <td>2.4.25-2</td> + </tr> + <tr> + <td>s390</td> + <td>2.4.17-2.woody.4</td> + <td>2.4.25-2 (and probably 2.4.21-3)</td> + </tr> +</table> + +<p>We recommend that you upgrade your kernel packages immediately, either +with a Debian provided kernel or with a self compiled one.</p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/security/2004/dsa-482.data" |