Debian Security Advisory DSA 1286-1 (linux-2.6)

Summary
The remote host is missing an update to linux-2.6 announced via advisory DSA 1286-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201286-1
Insight
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-0005 Daniel Roethlisberger discovered two buffer overflows in the cm4040 driver for the Omnikey CardMan 4040 device. A local user or malicious device could exploit this to execute arbitrary code in kernel space. CVE-2007-0958 Santosh Eraniose reported a vulnerability that allows local users to read otherwise unreadable files by triggering a core dump while using PT_INTERP. This is related to CVE-2004-1073. CVE-2007-1357 Jean Delvare reported a vulnerability in the appletalk subsystem. Systems with the appletalk module loaded can be triggered to crash by other systems on the local network via a malformed frame. CVE-2007-1592 Masayuki Nakagawa discovered that flow labels were inadvertently being shared between listening sockets and child sockets. This defect can be exploited by local users to cause a DoS (Oops). This problem has been fixed in the stable distribution in version 2.6.18.dfsg.1-12etch1. The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update: Debian 4.0 (etch) fai-kernels 1.17etch1 user-mode-linux 2.6.18-1um-2etch1 We recommend that you upgrade your kernel package immediately and reboot