Linux Security
    Linux Security
    Linux Security

    Debian: New Linux kernel 2.4.19 packages fix several vulnerabilities

    Posted By
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1070-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.               Martin Schulze, Dann Frazier
    May 21th, 2006                
    - --------------------------------------------------------------------------
    Package        : kernel-source-2.4.19,kernel-image-sparc-2.4,kernel-patch-2.4.19-mips
    Vulnerability  : several
    Problem-Type   : local/remote
    Debian-specific: no
    CVE IDs        : CVE-2004-0427 CVE-2005-0489 CVE-2004-0394 CVE-2004-0447 CVE-2004-0554 CVE-2004-0565 CVE-2004-0685  CVE-2005-0001 CVE-2004-0883 CVE-2004-0949 CVE-2004-1016 CVE-2004-1333 CVE-2004-0997 CVE-2004-1335 CVE-2004-1017 CVE-2005-0124 CVE-2005-0528 CVE-2003-0984 CVE-2004-1070 CVE-2004-1071 CVE-2004-1072 CVE-2004-1073 CVE-2004-1074 CVE-2004-0138 CVE-2004-1068 CVE-2004-1234 CVE-2005-0003 CVE-2004-1235 CVE-2005-0504 CVE-2005-0384 CVE-2005-0135
    Several local and remote vulnerabilities have been discovered in the Linux
    kernel that may lead to a denial of service or the execution of arbitrary
    code. The Common Vulnerabilities and Exposures project identifies the
    following problems:
         A local denial of service vulnerability in do_fork() has been found.     
         A local denial of service vulnerability in proc memory handling has
         been found.
         A buffer overflow in the panic handling code has been found.
         A local denial of service vulnerability through a null pointer
         dereference in the IA64 process handling code has been found.
         A local denial of service vulnerability through an infinite loop in
         the signal handler code has been found.
         An information leak in the context switch code has been found on
         the IA64 architecture.
         Unsafe use of copy_to_user in USB drivers may disclose sensitive
         A race condition in the i386 page fault handler may allow privilege
         Multiple vulnerabilities in the SMB filesystem code may allow denial
         of service of information disclosure.
         An information leak discovered in the SMB filesystem code.
         A local denial of service vulnerability has been found in the SCM layer.
         An integer overflow in the terminal code may allow a local denial of
         service vulnerability.
         A local privilege escalation in the MIPS assembly code has been found.
         A memory leak in the ip_options_get() function may lead to denial of
         Multiple overflows exist in the io_edgeport driver which might be usable
         as a denial of service attack vector.
         Bryan Fulton reported a bounds checking bug in the coda_pioctl function
         which may allow local users to execute arbitrary code or trigger a denial
         of service attack.
         A local privilege escalation in the mremap function has been found
         Inproper initialization of the RTC may disclose information.
         Insufficient input sanitising in the load_elf_binary() function may
         lead to privilege escalation.
         Incorrect error handling in the binfmt_elf loader may lead to privilege
         A buffer overflow in the binfmt_elf loader may lead to privilege
         escalation or denial of service.
         The open_exec function may disclose information.
         The binfmt code is vulnerable to denial of service through malformed
         a.out binaries.
         A denial of service vulnerability in the ELF loader has been found.
         A programming error in the unix_dgram_recvmsg() function may lead to
         privilege escalation.
         The ELF loader is vulnerable to denial of service through malformed
         Crafted ELF binaries may lead to privilege escalation, due to 
         insufficient checking of overlapping memory regions.
         A race condition in the load_elf_library() and binfmt_aout() functions
         may allow privilege escalation.
         An integer overflow in the Moxa driver may lead to privilege escalation.
         A remote denial of service vulnerability has been found in the PPP
         An IA64 specific local denial of service vulnerability has been found
         in the unw_unwind_to_user() function.
    The following matrix explains which kernel version for which architecture
    fix the problems mentioned above:
                                         Debian 3.0 (woody)
         Source                          2.4.19-4
         Sun Sparc architecture          26woody1
         Little endian MIPS architecture 0.020911.1.woody5
    We recommend that you upgrade your kernel package immediately and reboot
    the machine.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get dist-upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      692 27f44a0eec5837b0b01d26c6cff392be
          Size/MD5 checksum:    27768 6c719a6343c9ea0dad44a736b3842504
          Size/MD5 checksum:      792 d7c89c90fad77944ca1c5a18327f31dd
          Size/MD5 checksum:  1013866 21b4b677a7a319442c8fe8a4c72eb4c2
          Size/MD5 checksum:      672 4c353db091e8edc4395e46cf8d39ec42
          Size/MD5 checksum:    71071 7012adde9ba9a573e1be66f0d258721a
          Size/MD5 checksum: 32000211 237896fbb45ae652cc9c5cecc9b746da
      Architecture independent components:
          Size/MD5 checksum:  1521850 75d23c7c54094b1d25d3b708fd644407
          Size/MD5 checksum:  1547874 c6881b25e3a5967e0f6f9c351fb88962
          Size/MD5 checksum:  1014564 0e89364c2816f5f4519256a8ea367ab6
          Size/MD5 checksum:  1785490 c66cef9e87d9a89caeee02af31e3c96d
          Size/MD5 checksum: 25902158 321403201a198371fd55c9b8ac4583f7
      Sun Sparc architecture:
          Size/MD5 checksum:  3923058 db7bbd997410667bec4ac713d81d60ea
          Size/MD5 checksum:  4044796 106fcb86485531d96b4fdada61b71405
          Size/MD5 checksum:  3831424 347b0c290989f0cc99f3b336c156f61d
          Size/MD5 checksum:  3952220 f7dd8326c0ae0b0dee7c46e24023d0a2
      Big endian MIPS architecture:
          Size/MD5 checksum:  3890804 7348a8cd3961190aa2a19f562c96fe2f
          Size/MD5 checksum:  2080618 d52d00e7097ae0c8f4ccb6f34656361d
          Size/MD5 checksum:  2080830 db7141d3c0d86a43659176f974599cc2
          Size/MD5 checksum:    15816 c31e3b72d6eac6f3f99f75ea838e0bf9
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.