Secunia Security Advisory - Debian has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to gain escalated privileges.
59ec5724f68eabecb38a53949df78ca7cfdea5ad6c24ab9787e65e7b42b0ca1d
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Debian update for kernel
SECUNIA ADVISORY ID:
SA26994
VERIFY ADVISORY:
http://secunia.com/advisories/26994/
CRITICAL:
Less critical
IMPACT:
Privilege escalation, DoS
WHERE:
Local system
OPERATING SYSTEM:
Debian GNU/Linux 4.0
http://secunia.com/product/13844/
DESCRIPTION:
Debian has issued an update for the kernel. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service) or to gain escalated privileges.
For more information:
SA23361
SA26934
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 4.0 alias etch --
Source archives:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch4.dsc
Size/MD5 checksum: 5672 37f70bdc04b866a5dbcaa8f849be618a
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13etch4.diff.gz
Size/MD5 checksum:5321790 7bc41f428b95ef6fe99361ca8854e6da
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz
Size/MD5 checksum: 52225460 6a1ab0948d6b5b453ea0fce0fcc29060
Architecture independent components:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-13etch4_all.deb
Size/MD5 checksum:3586640 3bd5240a2610896cc497c62eb88b155c
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-13etch4_all.deb
Size/MD5 checksum:1083674 f8c4bf0032e87733d2ee3f2f1f739f9d
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-13etch4_all.deb
Size/MD5 checksum:1499612 10c0c285c4183493633f2b29f6036d14
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-13etch4_all.deb
Size/MD5 checksum: 41419632 8ced68949f94c78c5fc992deebdf1c85
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-5_2.6.18.dfsg.1-13etch4_all.deb
Size/MD5 checksum:3739000 f73b86b37f56ab817c341c43bd4cf8fe
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-13etch4_all.deb
Size/MD5 checksum:51982 4593b4bbf1f423b1d6e426602243defd
AMD64 architecture:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:3165218 4f4764c3aef1f9e11201852b94467850
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:51516 a90387023090038a122da75482b981fd
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-all-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:51542 cb132c34f0684e6a7b1facc9432ecca2
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum: 269088 d3d721166785a2acfc475b8a87eb7de0
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:3188578 58346ab81a8dae1bbff87412b9d071a8
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum: 269454 ef04a599ceb19d37a544cd6f95000138
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:3331732 8b0e214847656f1fb6b2d35396db36a7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum: 269772 1d3f9740c35d4510c6612bb645b1ef79
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:3354462 30fce94ecaa6650c7eb3307e76ad47d9
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum: 270790 4cd241518cb91e87bbcc62c09117accc
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum: 16800532 5cd7846a71c94945df71cf67b3d9f254
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum: 16840344 d264466281d7596876f18427dc7dad37
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:1648548 ff22e2a8c3f269295231b2b24289a892
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:1679922 f7061df614029b187d6883902b2053b7
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum: 15239984 c8de0964da37ad0d13a7c0b1a8dbe927
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum: 15257046 7fbf51b2580cdf39314d5cae996f8059
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:51500 d813a622add08eb6ca03f118af21e6c0
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-5-xen-vserver-amd64_2.6.18.dfsg.1-13etch4_amd64.deb
Size/MD5 checksum:51514 9f3b1193357e2b448f653e3dd8cac1ac
ORIGINAL ADVISORY:
http://www.debian.org/security/2007/dsa-1381
OTHER REFERENCES:
SA23361:
http://secunia.com/advisories/23361/
SA26934:
http://secunia.com/advisories/26934/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------