Linux Security
    Linux Security
    Linux Security

    Debian: Linux 2.4.27 fix several vulnerabilities DSA-921-1

    Date 14 Dec 2005
    Posted By Joe Shakespeare
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 921-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    December 14th, 2005           
    - --------------------------------------------------------------------------
    Package        : kernel-source-2.4.27
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE IDs        : CVE-2005-0756 CVE-2005-0757 CVE-2005-1762 CVE-2005-1767
                     CVE-2005-1768 CVE-2005-2456 CVE-2005-2458 CVE-2005-2459
                     CVE-2005-2553 CVE-2005-2801 CVE-2005-2872 CVE-2005-3275
    BugTraq ID     : 14477
    Debian Bug     : 311164 319629 321401 322237
    Several local and remote vulnerabilities have been discovered in the
    Linux kernel that may lead to a denial of service or the execution of
    arbitrary code.  The Common Vulnerabilieis and Exposures project
    identifies the following problems:
        Alexander Nyberg discovered that the ptrace() system call does not
        properly verify addresses on the amd64 architecture which can be
        exploited by a local attacker to crash the kernel.
        A problem in the offset handling in the xattr file system code for
        ext3 has been discovered that may allow users on 64-bit systems
        that have access to an ext3 filesystem with extended attributes to
        cause the kernel to crash.
        A vulnerability has been discovered in the ptrace() system call on
        the amd64 architecture that allowas a local attacker to cause the
        kernel to crash.
        A vulnerability has been discovered in the stack segment fault
        handler that could allow a local attacker to cause stack exception
        that will leed the kernel to crash under certain circumstances.
        Ilja van Sprundel discovered a race condition in the IA32 (x86)
        compatibility execve() systemcall for amd64 and IA64 that allows
        local attackers to cause the kernel to panic and possibly execute
        arbitrary code.
        Balazs Scheidler discovered that a local attacker could call
        setsockopt() with an invalid xfrm_user policy message which would
        cause the kernel to write beyond the boundaries of an array and
        Vladimir Volovich discovered a bug in the zlib routines which are
        also present in the Linux kernel and allows remote attackers to
        krash the kernel
        Another vulnerability has been discovered in the zlib routines
        which are also present in the Linux kernel and allows remote
        attackers to crash the kernel
        A null pointer dereference in ptrace when tracing a 64-bit
        executable can cause the kernel to crash.
        Andreas Gruenbacher discovered a bug in the ext2 and ext3 file
        systems.  When data areas are to be shared among two inodes not
        all information were compared for equality, which could expose
        wrong ACLs for files.
        Chad Walstrom discovered that the ipt_recent kernel module to stop
        SSH bruteforce attacks could cause the kernel to crash on 64-bit
        An error in the NAT code allows remote attackers to cause a denial
        of service (memory corruption) by causing two packets for the same
        protocol to be NATed at the same time, which leads to memory
    The following matrix explains which kernel version for which architecture
    fix the problems mentioned above:
                                        Debian 3.1 (sarge)
    Source                              2.4.27-10sarge1
    Alpha architecture                  2.4.27-10sarge1
    ARM architecture                    2.4.27-2sarge1
    Intel IA-32 architecture            2.4.27-10sarge1
    Intel IA-64 architecture            2.4.27-10sarge1
    Motorola 680x0 architecture         2.4.27-3sarge1
    Big endian MIPS architecture        2.4.27-10.sarge1.040815-1
    Little endian MIPS architecture     2.4.27-10.sarge1.040815-1
    PowerPC architecture                2.4.27-10sarge1
    IBM S/390 architecture              2.4.27-2sarge1
    Sun Sparc architecture              2.4.27-9sarge1
    We recommend that you upgrade your kernel package immediately and
    reboot the machine.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      900 cf29dbb52e2fd25da1d4ecb8dbe5e854
          Size/MD5 checksum:   699494 3b26bc94e734e3e9c7de8851e9e308b7
          Size/MD5 checksum: 38470181 56df34508cdc47a53d15bc02ffe4f42d
          Size/MD5 checksum:      831 0278c9e5d78a3f0192808e89d2fa389b
          Size/MD5 checksum:    29945 c6c19bbf99fbff1d67d5216f28855755
          Size/MD5 checksum:      577 0f7c9c24f228948824056914841278c5
          Size/MD5 checksum:   828336 b38387d519bee09b40f6b706d54f60fc
          Size/MD5 checksum:      839 99ec4f95021ee6e9fb9b98087109c0d7
          Size/MD5 checksum:    32182 efdb3fde273dc5d0124d38f6d7dccbd6
          Size/MD5 checksum:     1581 0ddc89456decf24ce5d10aa79824cd5e
          Size/MD5 checksum:    97268 6aa8cd7f87e3bda01cdcd09bda96e596
          Size/MD5 checksum:     1143 21e48f420a88976b9063e88cc7d8add5
          Size/MD5 checksum:    53267 e3c410bc8e3bdfdfe81dbc00575f62e0
          Size/MD5 checksum:      889 a5253abf41b798233d68c8004da5049a
          Size/MD5 checksum:     9791 3a5c08d227dac66ad83c75cd68c74375
          Size/MD5 checksum:     1062 d03d719f6a6cef2732ba218ae40a6770
          Size/MD5 checksum:   307828 fa74234db1cbd88277fcdd490b10a887
          Size/MD5 checksum:     1129 125083312667f1bdb7c62e217b41963a
          Size/MD5 checksum:  1462360 ab3702cbcde8976d422e32d13173c942
          Size/MD5 checksum:      825 ecfb13748a5231fb8e1580b7bcd99600
          Size/MD5 checksum:     8123 5e41863c13ad4b96fe90ed25abd3e33d
          Size/MD5 checksum:     1074 a22bdef307d571cd0d9a055d0752111b
          Size/MD5 checksum:    22912 2bcc7519c5da2edfe0b450b02b1c1e85
      Architecture independent components:
          Size/MD5 checksum:  3577464 3a2c82fcc546bee30fb522f28193f3e7
          Size/MD5 checksum:   650880 2cfb0a84539c910e596abba17e7d8d48
          Size/MD5 checksum: 31026166 857f97955b1c7d145990f28581731fb7
          Size/MD5 checksum:    24418 c346db9cb71c6e39328d49318a2f2ed4
          Size/MD5 checksum:   832704 b9e1f325937d5f7596688d5dd848de55
      Alpha architecture:
          Size/MD5 checksum:     5690 26d3f171f62b80b0b8e978652f8f485a
          Size/MD5 checksum:  4572104 d92c8a0b7398b6b41d52c7a55a3d88f1
          Size/MD5 checksum:   270932 be9e18785e87f29f8632a9fc973b0bbb
          Size/MD5 checksum:   272886 dea691efa19f4b82691124fa62e8963f
          Size/MD5 checksum: 16516634 eb2e92ade4debc9bfdedb40134b3efd6
          Size/MD5 checksum: 16970506 2b58db598e31823c08f993da80ab10d0
          Size/MD5 checksum:    18104 42337c47e36aab7279b3355987057447
      AMD64 architecture:
          Size/MD5 checksum:    14830 1bef3063d2042b93b8734bbf02b57e8f
      ARM architecture:
          Size/MD5 checksum:   464238 58d912323c90cc0c588d7882965a0171
          Size/MD5 checksum:  4657690 35d64aacb4e4d9286360881edec6a359
          Size/MD5 checksum:  1688134 5cc159ac4ba8cd9152513616ebeff876
          Size/MD5 checksum:  1053572 2ed7da9dfede24ce6c3ac6f3300c9f30
          Size/MD5 checksum:  7330858 93afcdcfda01d2d08b0bc86f32a3d623
          Size/MD5 checksum:  3141064 fdd304023a6f6da48c69417b1e531469
          Size/MD5 checksum:  3663614 e532db0019cc83e0b40e99cc5bd16179
          Size/MD5 checksum:    16498 98ff86517ac204296c7d2a8bd9d771cb
      Intel IA-32 architecture:
          Size/MD5 checksum:     8224 ae479d6dbd6c171e94a25e5b59b4243f
          Size/MD5 checksum:  1823160 c058363ae7646c370f77d620c6bb6438
          Size/MD5 checksum:   297168 19b508f76e107d8cf988560b3fd04a8b
          Size/MD5 checksum:   298340 073efbc2d728e4ee3b30e980d2d0f5e6
          Size/MD5 checksum:   298200 94f48b9438f8e100590c8874b3c05e0c
          Size/MD5 checksum:   300156 1143aa70f66386bf4789431e80810b2d
          Size/MD5 checksum:   297050 44f3d785ad2c70829373321327e6e3e6
          Size/MD5 checksum:   297978 7795ea75d534ded9d2a7ade27fc3cf21
          Size/MD5 checksum:   299650 9676b8d779e9dd09f0583d950e2fd2d5
          Size/MD5 checksum: 11046010 e32bdedde43897d24792ce5199c8e428
          Size/MD5 checksum: 12024834 edfa4a6008fde7599fbd7e5081cc2bb9
          Size/MD5 checksum: 12336042 d2c1f84d0c771fa8de10c87e0cb35e70
          Size/MD5 checksum: 12679824 4ab0ad4ca8bf76e6614768cee8245c24
          Size/MD5 checksum: 11708878 7842c8dfed5e6c2cbbed136807b5cf7f
          Size/MD5 checksum: 12083292 b45dd7f50ef9f4726711c4af87368037
          Size/MD5 checksum: 12415392 b56e1c928e816d53f6cba41f0138e91d
          Size/MD5 checksum:   267586 95d23b87e054f0a8dc82edd6a7f51f60
          Size/MD5 checksum:   292452 d090775026be223c949e0f86f5b1f646
          Size/MD5 checksum:   298278 f8cc95014790c87b62bf81b2b2d2d674
          Size/MD5 checksum:   303840 f1362454b42361047297b1ef7f90769c
          Size/MD5 checksum:   286252 d67de5ec744bad676981089e5623561c
          Size/MD5 checksum:   292100 0ce7cff58a32eb924199a652062a7e9f
          Size/MD5 checksum:   296978 fdb699b60e0d3ae5fa4df76e0203c603
          Size/MD5 checksum:    14278 b17654c8d53b3813df9eaef78810efd4
      Intel IA-64 architecture:
          Size/MD5 checksum:     5190 00c8fff6af32adf62f8c91794745931b
          Size/MD5 checksum:  4678756 01467522c3106fab54cf6983a9c6487d
          Size/MD5 checksum:   239184 cd07eff9264141e6ddbd015f5f76e99e
          Size/MD5 checksum:   240504 03b131531af57cd2f46cf8ff8ba93f45
          Size/MD5 checksum:   239212 457102e92a389246447410ce172bbd2f
          Size/MD5 checksum:   240498 66cc452b54b87366d7755da6693aa76c
          Size/MD5 checksum:     4916 8432a3f7650e77fc8ab88f9bf6efdc2a
          Size/MD5 checksum:     4934 83fd412732f3cbc3d8b9c642f968bc61
          Size/MD5 checksum:     4944 91ec4c1ca5123a5552cb1b74bea98b29
          Size/MD5 checksum:     4962 26f8609ffe3a5711730283a5ac19e206
          Size/MD5 checksum: 16665798 0dfd99eeb9d1c8933ec71f0cdc80a71e
          Size/MD5 checksum: 17023766 09ae0a0c0b133abe047cd50b8e09f02e
          Size/MD5 checksum: 16623970 2b70e151d5c13c89d7646dc01d28a277
          Size/MD5 checksum: 16970478 affcf0503482e489ae8384b3d7279fce
          Size/MD5 checksum:    19858 ba4cea60b31ac6926bc2e12c89c98232
      HP Precision architecture:
          Size/MD5 checksum:    16894 ef6c734bc7a3be187324d77d6432affd
      Motorola 680x0 architecture:
          Size/MD5 checksum:  2628642 9d7d78cb18b165526d3b9c69274cc186
          Size/MD5 checksum:  2535972 5367f4e405cd97ae879d13149813beca
          Size/MD5 checksum:  2384766 853a2da6b5f179ff9d4bedf82e1a041f
          Size/MD5 checksum:  2468516 788d44179a2aa91c9868c15fb371c11d
          Size/MD5 checksum:  2313758 4b7cb73958e218b3f63de0c0e9347e26
          Size/MD5 checksum:  2386394 e0a43e4b96b3ddfb782dd842bf063f89
          Size/MD5 checksum:  2252242 a5f233f48b188fc7889a83c676d64b9e
          Size/MD5 checksum:    14000 c9efe0c462af304a1ae5a9d3f3ccd2c2
      Big endian MIPS architecture:
          Size/MD5 checksum:  4679334 8c640c4a3323fe874fbf7736afbf592f
          Size/MD5 checksum:  3846338 af689f1f43f75f242ee3b1ee1d8d5c98
          Size/MD5 checksum:  3847118 3ee1d8be5f4e2e4c9e4d9e09cb9f31ac
          Size/MD5 checksum:  7171242 1ddb30791997030df21a1ca98f4874af
          Size/MD5 checksum:    18054 9174691199f426e382a8876fbb74d0ac
      Little endian MIPS architecture:
          Size/MD5 checksum:  4684404 1d8dd72aa68218631bb8c53331bc30f4
          Size/MD5 checksum:  3030092 dfddac8fdc4fee01d91dcb6a4eb28eea
          Size/MD5 checksum:  2988820 3f1df983a7cf1691052fe9af1d84b7b1
          Size/MD5 checksum:  4099956 49da290cf77d5a9a83dd2c365d347900
          Size/MD5 checksum:  2135184 49d13799447a86acc1462c9d58c0e8e9
          Size/MD5 checksum:  7035572 b4040a68e042f355c42af12cdc30a587
          Size/MD5 checksum:  4665112 ce758787e61df3a2f1d4b43dccc68a00
          Size/MD5 checksum:    18080 fbb7d48b4b95f67ce8777afa25168ddb
      PowerPC architecture:
          Size/MD5 checksum:    16540 fde92bdf463104a5fd110846fbd10d6f
          Size/MD5 checksum:   137990 10c69171982c0953614db790071fe897
          Size/MD5 checksum:   137824 714f0b2cd873ea876d68d183fab7e59e
          Size/MD5 checksum:   151838 ab7d3a6c324a2b64eb674148cead1393
          Size/MD5 checksum:   152182 41e9c9254f399c29b0c198b6d94ca7ac
          Size/MD5 checksum:   151902 0539b0f041ffbe37a75b71a5554ffd66
          Size/MD5 checksum:  4681796 c5e92c06e7a9887639da199bc1b94f80
          Size/MD5 checksum:  4691992 0f2e90800a27bf34f48ea5dc062cbb59
          Size/MD5 checksum:  4799772 7a4ec03f1373d998539fe68d209589e3
          Size/MD5 checksum:  2494658 54d0408ab521a0a5e0874c80ebdba402
          Size/MD5 checksum:  1813568 f6a3da841cffbed57b7bf11119abaf0d
          Size/MD5 checksum: 13474368 134af15cd55b4b3848fdbdeff7ef214d
          Size/MD5 checksum: 12746708 631ef07000bc6f99e43011a63a65c43f
          Size/MD5 checksum: 13779958 5c40bd31a118b3bafda658e258379423
          Size/MD5 checksum:    65396 a2d652c8bf5b5005597abda9918f02fc
          Size/MD5 checksum:     8710 4f867433a832c50e2920c4a3c21e4cb2
          Size/MD5 checksum:     8636 3c83da402850e2e86197a655e26377a2
      IBM S/390 architecture:
          Size/MD5 checksum:    16892 6323a7ca3a316a8eaa412c2a2d9e0e7c
          Size/MD5 checksum:  4578000 97fce93cc2ebc4da7c0a7bab1c157aef
          Size/MD5 checksum:  2774574 86262b4b2bb4c6db5471c97dcc1747b4
          Size/MD5 checksum:   991868 a712b00ecf74c79fadeeb0f50b298618
          Size/MD5 checksum:  2966354 5ebdd9b9fa80cdbdf0049683eaad24ee
      Sun Sparc architecture:
          Size/MD5 checksum:    15812 85f732679a460ea8bed9a7017dbfc0b8
          Size/MD5 checksum:     8328 1e092e0877937ac5dbf46e347992c7d3
          Size/MD5 checksum:  2023482 b50d08e5c4c12fff4473e77babeda1ab
          Size/MD5 checksum:   162670 2c495f6b6e414dc24f2c676ecd84dda4
          Size/MD5 checksum:   164478 f59e33098dec7e1ff68b162aab6d56a6
          Size/MD5 checksum:   201214 fa92988ddfba0e9f03ace13f365dfc77
          Size/MD5 checksum:   202452 d56ab1dd8ddb9d4b10de13c37c4c4af5
          Size/MD5 checksum:  3597102 1c5334adb92bbaf0ce96e82abcf6d77e
          Size/MD5 checksum:  3784076 3d1b5e5c3e147bf760c6077fa36eb783
          Size/MD5 checksum:  6377902 7bd0e77ec9494b0ed352917b829fa5a0
          Size/MD5 checksum:  6543220 a73b077777c3a22ca9538666d3ff8aee
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"12","type":"x","order":"1","pct":36.36,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.18,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":45.45,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.