Package: kernel-source-2.6.8 Severity: important Tags: security patch CAN-2005-0867 describes an integer overflow in sysfs_write_file() that could be exploited to overwrite kernel memory. I've attached the patch from Alexander Nyberg as found in the Ubuntu package.
2.4 is not affected. Cheers, Moritz -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages kernel-source-2.6.8 depends on: ii binutils 2.15-5 The GNU assembler, linker and bina ii bzip2 1.0.2-5 high-quality block-sorting file co ii coreutils [fileutils] 5.2.1-2 The GNU core utilities
sysfs-write-file.dpatch
Description: application/shellscript