Debian alert: Debian esound packages not affected by /tmp/.esd race condition

Posted by dave on Oct 9, 2000 10:55 AM EDT
Mailing list
Mail this story
Print this story

Linux-Mandrake has recently released a Security Advisory (MDKSA-2000:051) covering a race condition in the esound. Debian is not affected by this bug; the bug is specific to the unix domain socket support, which was turned off in stable (2.2/potato) and unstable (woody) on February 16, 2000. Therefore neither the current stable or unstable distribution of Debian is vulnerable to this problem. Debian 2.1 (aka "slink") is also not vulnerable to this problem; the version of esound in Debian 2.1 is 0.2.6, which predates the buggy unix domain socket code.

-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------
Debian Security Advisory                                 security@debian.org
http://www.debian.org/security/                            Daniel Jacobowitz
October 8, 2000
- ----------------------------------------------------------------------------

Package: esound
Vulnerability: Race condition
Debian-specific: no
Vulnerable: no

Linux-Mandrake has recently released a Security Advisory (MDKSA-2000:051)
covering a race condition in the esound.  Debian is not affected by this bug;
the bug is specific to the unix domain socket support, which was turned off in
stable (2.2/potato) and unstable (woody) on February 16, 2000. Therefore
neither the current stable or unstable distribution of Debian is vulnerable
to this problem.  Debian 2.1 (aka "slink") is also not vulnerable to this problem;
the version of esound in Debian 2.1 is 0.2.6, which predates the buggy unix domain
socket code.

More information regarding this bug can be found at:
http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=yes&bug=58054

- ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable updates
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBOeIUIz5fjwqn/34JAQHsewQAr4NvRrcJRiaLKlKx0nVWEX9/fPkGz+ib
EPem1gZYfb9FEJrV7lNhFTGqjoXfS0ZFryFp3ZfbiBkKOzAcH07QVvUSqqHFegf8
Q42gpppa2KxeP83iNUjQp4aca/VlBEHMH9uRvV9YNbd2TY/79CBoN3yvL+n00a+q
BI9aZn7IotA=
=3IJF
-----END PGP SIGNATURE-----


  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.