7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
Several local vulnerabilities have been discovered in the Linux kernel
that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:
DSA-1378 resolved this problem for the amd64 flavour kernels, but
Tim Wickberg and Ralf HemmenstΓ€dt reported an outstanding issue with
the xen-amd64 and xen-vserver-amd64 flavours that is resolved by
this DSA.
These problems have been fixed in the stable distribution in version
2.6.18.dfsg.1-13etch4.
This is an update to DSA-1381-1 which included only amd64 binaries for
linux-2.6. Builds for all other architectures are now available, as well as
rebuilds of ancillary packages that make use of the included linux source.
The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:
Debian 4.0 (etch) | |
---|---|
fai-kernels | 1.17+etch.13etch4 |
kernel-patch-openvz | 028.18.1etch5 |
user-mode-linux | 2.6.18-1um-2etch.13etch4 |
We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.