Package: linux-2.6 Version: 2.6.22-6.lenny1 Severity: grave Tags: security patch
Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2008-1673[0]: | The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 | and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic | modules; and (b) the gxsnmp package; does not properly validate length | values during decoding of ASN.1 BER data, which allows remote | attackers to cause a denial of service (crash) or execute arbitrary | code via (1) a length greater than the working buffer, which can lead | to an unspecified overflow; (2) an oid length of zero, which can lead | to an off-by-one error; or (3) an indefinite length for a primitive | encoding. Patches are linked from the mitre site but I guess you will update to 2.6.25.5 anyway. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673 http://security-tracker.debian.net/tracker/CVE-2008-1673 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpbWBzpFRqgh.pgp
Description: PGP signature