English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 75096 CVE Beschreibungen
und 39644 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56956
Kategorie:Debian Local Security Checks
Titel:Debian Security Advisory DSA 1097-1 (kernel-source-2.4.27)
Zusammenfassung:Debian Security Advisory DSA 1097-1 (kernel-source-2.4.27)
Beschreibung:The remote host is missing an update to kernel-source-2.4.27
announced via advisory DSA 1097-1. For information on issues
addressed in this update, please visit the referenced security
advisories.

The following matrix explains which kernel version for which architecture
fix the problems mentioned above:

Debian 3.1 (sarge)
Source 2.4.27-10sarge3
Alpha architecture 2.4.27-10sarge3
ARM architecture 2.4.27-2sarge3
Intel IA-32 architecture 2.4.27-10sarge3
Intel IA-64 architecture 2.4.27-10sarge3
Motorola 680x0 architecture 2.4.27-3sarge3
Big endian MIPS 2.4.27-10.sarge3.040815-1
Little endian MIPS 2.4.27-10.sarge3.040815-1
PowerPC architecture 2.4.27-10sarge3
IBM S/390 architecture 2.4.27-2sarge3
Sun Sparc architecture 2.4.27-9sarge3

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

Debian 3.1 (sarge)
fai-kernels 1.9.1sarge2
kernel-image-2.4.27-speakup 2.4.27-1.1sarge2
mindi-kernel 2.4.27-2sarge2
systemimager 3.2.3-6sarge2

We recommend that you upgrade your kernel package immediately and reboot

Solution:
http://www.securityspace.com/smysecure/catid.html?in=DSA%201097-1
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-0038
Debian Security Information: DSA-1097 (Google Search)
http://www.debian.org/security/2006/dsa-1097
Debian Security Information: DSA-1103 (Google Search)
http://www.debian.org/security/2006/dsa-1103
http://www.redhat.com/support/errata/RHSA-2006-0575.html
http://www.ubuntu.com/usn/usn-302-1
BugTraq ID: 17178
http://www.securityfocus.com/bid/17178
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10945
http://www.vupen.com/english/advisories/2006/1046
http://www.vupen.com/english/advisories/2006/2554
http://secunia.com/advisories/19330
http://secunia.com/advisories/20671
http://secunia.com/advisories/20716
http://secunia.com/advisories/20914
http://secunia.com/advisories/21465
http://secunia.com/advisories/22417
XForce ISS Database: linux-netfilter-doreplace-overflow(25400)
http://xforce.iss.net/xforce/xfdb/25400
Common Vulnerability Exposure (CVE) ID: CVE-2006-0039
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2722971cbe831117686039d5c334f2c0f560be13
http://www.redhat.com/support/errata/RHSA-2006-0689.html
http://www.ubuntu.com/usn/usn-311-1
BugTraq ID: 18113
http://www.securityfocus.com/bid/18113
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10309
http://www.vupen.com/english/advisories/2006/1893
http://www.osvdb.org/25697
http://secunia.com/advisories/20185
http://secunia.com/advisories/20991
http://secunia.com/advisories/22292
http://secunia.com/advisories/22945
http://secunia.com/advisories/21476
XForce ISS Database: linux-doaddcounters-race-condition(26583)
http://xforce.iss.net/xforce/xfdb/26583
Common Vulnerability Exposure (CVE) ID: CVE-2006-0741
http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00003.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:059
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://www.redhat.com/support/errata/RHSA-2006-0437.html
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.ubuntulinux.org/support/documentation/usn/usn-263-1
BugTraq ID: 16925
http://www.securityfocus.com/bid/16925
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10518
http://www.vupen.com/english/advisories/2006/0804
http://www.osvdb.org/23607
http://securitytracker.com/id?1015724
http://secunia.com/advisories/19083
http://secunia.com/advisories/19108
http://secunia.com/advisories/19220
http://secunia.com/advisories/20237
http://secunia.com/advisories/21136
http://secunia.com/advisories/21745
http://secunia.com/advisories/20398
http://secunia.com/advisories/21983
XForce ISS Database: kernel-elf-dos(25001)
http://xforce.iss.net/xforce/xfdb/25001
Common Vulnerability Exposure (CVE) ID: CVE-2006-0742
SGI Security Advisory: 20060402-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
BugTraq ID: 16993
http://www.securityfocus.com/bid/16993
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10742
http://www.vupen.com/english/advisories/2006/0856
http://www.osvdb.org/23660
http://secunia.com/advisories/19078
http://secunia.com/advisories/19607
XForce ISS Database: kernel-dieifkernel-dos(25068)
http://xforce.iss.net/xforce/xfdb/25068
Common Vulnerability Exposure (CVE) ID: CVE-2006-1056
Bugtraq: 20060419 FreeBSD Security Advisory FreeBSD-SA-06:14.fpu (Google Search)
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/451404/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/451419/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/451417/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0009 - VMware ESX Server 3.0.0 AMD fxsave/restore issue (Google Search)
http://www.securityfocus.com/archive/1/archive/1/451421/100/0/threaded
http://lwn.net/Alerts/180820/
FreeBSD Security Advisory: FreeBSD-SA-06:14
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc
http://security.freebsd.org/advisories/FreeBSD-SA-06:14-amd.txt
http://marc.theaimsgroup.com/?l=linux-kernel&m=114548768214478&w=2
http://www.redhat.com/support/errata/RHSA-2006-0579.html
SuSE Security Announcement: SUSE-SU-2014:0446 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
BugTraq ID: 17600
http://www.securityfocus.com/bid/17600
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9995
http://www.vupen.com/english/advisories/2006/1426
http://www.vupen.com/english/advisories/2006/4353
http://www.vupen.com/english/advisories/2006/4502
http://www.vupen.com/english/advisories/2006/1475
http://www.osvdb.org/24807
http://www.osvdb.org/24746
http://securitytracker.com/id?1015966
http://secunia.com/advisories/19724
http://secunia.com/advisories/19715
http://secunia.com/advisories/21035
http://secunia.com/advisories/22875
http://secunia.com/advisories/22876
http://secunia.com/advisories/19735
XForce ISS Database: amd-fpu-information-disclosure(25871)
http://xforce.iss.net/xforce/xfdb/25871
Common Vulnerability Exposure (CVE) ID: CVE-2006-1242
Bugtraq: 20060314 Linux zero IP ID vulnerability? (Google Search)
http://www.securityfocus.com/archive/1/archive/1/427622/100/0/threaded
Bugtraq: 20060323 Re: Linux zero IP ID vulnerability? (Google Search)
http://www.securityfocus.com/archive/1/archive/1/427753/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/427893/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/428605/30/6210/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.ubuntulinux.org/support/documentation/usn/usn-281-1
BugTraq ID: 17109
http://www.securityfocus.com/bid/17109
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10317
http://www.vupen.com/english/advisories/2006/1140
http://secunia.com/advisories/19402
http://secunia.com/advisories/19955
http://secunia.com/advisories/20157
Common Vulnerability Exposure (CVE) ID: CVE-2006-1343
Bugtraq: 20060531 rPSA-2006-0087-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/435490/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/451426/100/200/threaded
http://marc.theaimsgroup.com/?l=linux-netdev&m=114148078223594&w=2
Debian Security Information: DSA-1184 (Google Search)
http://www.debian.org/security/2006/dsa-1184
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
http://www.redhat.com/support/errata/RHSA-2006-0580.html
http://www.trustix.org/errata/2006/0032/
BugTraq ID: 17203
http://www.securityfocus.com/bid/17203
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10875
http://www.vupen.com/english/advisories/2006/2071
http://www.osvdb.org/29841
http://secunia.com/advisories/19357
http://secunia.com/advisories/21045
http://secunia.com/advisories/22093
XForce ISS Database: linux-sockaddr-memory-leak(25425)
http://xforce.iss.net/xforce/xfdb/25425
Common Vulnerability Exposure (CVE) ID: CVE-2006-1368
BugTraq ID: 17831
http://www.securityfocus.com/bid/17831
Common Vulnerability Exposure (CVE) ID: CVE-2006-1524
BugTraq ID: 17587
http://www.securityfocus.com/bid/17587
http://www.vupen.com/english/advisories/2006/1391
http://www.osvdb.org/24714
http://secunia.com/advisories/19664
http://secunia.com/advisories/19657
XForce ISS Database: linux-madvise-security-bypass(25870)
http://xforce.iss.net/xforce/xfdb/25870
Common Vulnerability Exposure (CVE) ID: CVE-2006-1525
BugTraq ID: 17593
http://www.securityfocus.com/bid/17593
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10146
http://www.vupen.com/english/advisories/2006/1399
http://www.osvdb.org/24715
http://secunia.com/advisories/19709
XForce ISS Database: linux-ip-route-input-dos(25872)
http://xforce.iss.net/xforce/xfdb/25872
Common Vulnerability Exposure (CVE) ID: CVE-2006-1857
SuSE Security Announcement: SUSE-SA:2006:042 (Google Search)
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
SuSE Security Announcement: SUSE-SA:2006:047 (Google Search)
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
BugTraq ID: 18085
http://www.securityfocus.com/bid/18085
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10622
http://www.osvdb.org/25695
http://secunia.com/advisories/21179
http://secunia.com/advisories/21498
XForce ISS Database: linux-sctp-hback-dos(26584)
http://xforce.iss.net/xforce/xfdb/26584
Common Vulnerability Exposure (CVE) ID: CVE-2006-1858
http://www.redhat.com/support/errata/RHSA-2006-0617.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9510
http://www.osvdb.org/25696
http://secunia.com/advisories/21605
http://secunia.com/advisories/22174
XForce ISS Database: linux-sctp-parameter-dos(26585)
http://xforce.iss.net/xforce/xfdb/26585
Common Vulnerability Exposure (CVE) ID: CVE-2006-1864
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
http://www.redhat.com/support/errata/RHSA-2006-0710.html
http://www.trustix.org/errata/2006/0026
BugTraq ID: 17735
http://www.securityfocus.com/bid/17735
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11327
http://www.osvdb.org/25067
http://secunia.com/advisories/19869
http://secunia.com/advisories/21614
http://secunia.com/advisories/22497
http://secunia.com/advisories/23064
XForce ISS Database: kernel-smbfs-directory-traversal(26137)
http://xforce.iss.net/xforce/xfdb/26137
Common Vulnerability Exposure (CVE) ID: CVE-2006-2271
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html
http://labs.musecurity.com/advisories/MU-200605-01.txt
BugTraq ID: 17910
http://www.securityfocus.com/bid/17910
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10934
http://www.vupen.com/english/advisories/2006/1734
http://www.osvdb.org/25632
http://secunia.com/advisories/19990
XForce ISS Database: linux-sctp-ecne-chunk-dos(26430)
http://xforce.iss.net/xforce/xfdb/26430
Common Vulnerability Exposure (CVE) ID: CVE-2006-2272
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11243
http://www.osvdb.org/25633
XForce ISS Database: linux-sctp-control-chunk-dos(26431)
http://xforce.iss.net/xforce/xfdb/26431
Common Vulnerability Exposure (CVE) ID: CVE-2006-2274
BugTraq ID: 17955
http://www.securityfocus.com/bid/17955
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9531
http://www.osvdb.org/25746
XForce ISS Database: linux-sctp-skb-pull-dos(26432)
http://xforce.iss.net/xforce/xfdb/26432
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 39644 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.