Re: [SECURITY] [DSA 1862-1] New Linux 2.6.26 packages fix privilege escalation

2009-08-17 Thread Jan de Groot
On Fri, 2009-08-14 at 13:31 -0600, dann frazier wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - --
 Debian Security Advisory DSA-1862-1secur...@debian.org
 http://www.debian.org/security/   dann frazier
 Aug 14, 2009http://www.debian.org/security/faq
 - --
 
 Package: linux-2.6
 Vulnerability  : privilege escalation
 Problem type   : local
 Debian-specific: no
 CVE Id(s)  : CVE-2009-2692
 
 A vulnerability has been discovered in the Linux kernel that may lead
 to privilege escalation. The Common Vulnerabilities and Exposures project
 identifies the following problem:
 
 CVE-2009-2692
 
 Tavis Ormandy and Julien Tinnes discovered an issue with how the
 sendpage function is initialized in the proto_ops structure.
 Local users can exploit this vulnerability to gain elevated
 privileges.
 
 For the stable distribution (lenny), this problem has been fixed in
 version 2.6.26-17lenny2.

There's also a 2.6.26-18 in lenny-proposed-updates which contains some
bugfixes that 2.6.26-17lenny2 doesn't have. The version of this kernel
is higher than this security release, but it doesn't have the security
patch included in this release. What's the future of this kernel in
lenny-proposed-updates, will we see 2.6.26-18lenny1, or will it get
removed?
I don't have problems with downgrading to 2.6.26-17lenny2 for now, but
I can imagine some users need the bugfixes in 2.6.26-18 and are still
affected by this bug.


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: [SECURITY] [DSA 1862-1] New Linux 2.6.26 packages fix privilege escalation

2009-08-17 Thread Michael S. Gilbert
On Mon, 17 Aug 2009 15:36:57 +0200, Jan de Groot wrote:
 On Fri, 2009-08-14 at 13:31 -0600, dann frazier wrote:
  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
  
  - --
  Debian Security Advisory DSA-1862-1secur...@debian.org
  http://www.debian.org/security/   dann frazier
  Aug 14, 2009http://www.debian.org/security/faq
  - --
  
  Package: linux-2.6
  Vulnerability  : privilege escalation
  Problem type   : local
  Debian-specific: no
  CVE Id(s)  : CVE-2009-2692
  
  A vulnerability has been discovered in the Linux kernel that may lead
  to privilege escalation. The Common Vulnerabilities and Exposures project
  identifies the following problem:
  
  CVE-2009-2692
  
  Tavis Ormandy and Julien Tinnes discovered an issue with how the
  sendpage function is initialized in the proto_ops structure.
  Local users can exploit this vulnerability to gain elevated
  privileges.
  
  For the stable distribution (lenny), this problem has been fixed in
  version 2.6.26-17lenny2.
 
 There's also a 2.6.26-18 in lenny-proposed-updates which contains some
 bugfixes that 2.6.26-17lenny2 doesn't have. The version of this kernel
 is higher than this security release, but it doesn't have the security
 patch included in this release. What's the future of this kernel in
 lenny-proposed-updates, will we see 2.6.26-18lenny1, or will it get
 removed?
 I don't have problems with downgrading to 2.6.26-17lenny2 for now, but
 I can imagine some users need the bugfixes in 2.6.26-18 and are still
 affected by this bug.

proposed-updates is not supported by the security team.  however,
patches will certainly get applied there at some point before the next
point release; just don't expect that to be done with much urgency. if
you are concerned about security, stick with the core package pool.

mike


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org