Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56013
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-921-1)
Summary:The remote host is missing an update for the Debian 'kernel-image-2.4.27-alpha, kernel-image-2.4.27-arm, kernel-image-2.4.27-i386, kernel-image-2.4.27-ia64, kernel-image-2.4.27-m68k, kernel-image-2.4.27-s390, kernel-image-2.4.27-sparc, kernel-patch-2.4.27-arm, kernel-patch-2.4.27-mips, kernel-patch-powerpc-2.4.27, kernel-source-2.4.27' package(s) announced via the DSA-921-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'kernel-image-2.4.27-alpha, kernel-image-2.4.27-arm, kernel-image-2.4.27-i386, kernel-image-2.4.27-ia64, kernel-image-2.4.27-m68k, kernel-image-2.4.27-s390, kernel-image-2.4.27-sparc, kernel-patch-2.4.27-arm, kernel-patch-2.4.27-mips, kernel-patch-powerpc-2.4.27, kernel-source-2.4.27' package(s) announced via the DSA-921-1 advisory.

Vulnerability Insight:
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2005-0756

Alexander Nyberg discovered that the ptrace() system call does not properly verify addresses on the amd64 architecture which can be exploited by a local attacker to crash the kernel.

CVE-2005-0757

A problem in the offset handling in the xattr file system code for ext3 has been discovered that may allow users on 64-bit systems that have access to an ext3 filesystem with extended attributes to cause the kernel to crash.

CVE-2005-1762

A vulnerability has been discovered in the ptrace() system call on the amd64 architecture that allows a local attacker to cause the kernel to crash.

CVE-2005-1767

A vulnerability has been discovered in the stack segment fault handler that could allow a local attacker to cause a stack exception that will lead the kernel to crash under certain circumstances.

CVE-2005-1768

Ilja van Sprundel discovered a race condition in the IA32 (x86) compatibility execve() systemcall for amd64 and IA64 that allows local attackers to cause the kernel to panic and possibly execute arbitrary code.

CVE-2005-2456

Balazs Scheidler discovered that a local attacker could call setsockopt() with an invalid xfrm_user policy message which would cause the kernel to write beyond the boundaries of an array and crash.

CVE-2005-2458

Vladimir Volovich discovered a bug in the zlib routines which are also present in the Linux kernel and allows remote attackers to crash the kernel.

CVE-2005-2459

Another vulnerability has been discovered in the zlib routines which are also present in the Linux kernel and allows remote attackers to crash the kernel.

CVE-2005-2553

A null pointer dereference in ptrace when tracing a 64-bit executable can cause the kernel to crash.

CVE-2005-2801

Andreas Gruenbacher discovered a bug in the ext2 and ext3 file systems. When data areas are to be shared among two inodes not all information were compared for equality, which could expose wrong ACLs for files.

CVE-2005-2872

Chad Walstrom discovered that the ipt_recent kernel module to stop SSH bruteforce attacks could cause the kernel to crash on 64-bit architectures.

CVE-2005-3275

An error in the NAT code allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.

The following matrix explains which kernel version for which architecture fix the problems mentioned above:



Debian 3.1 (sarge)

Source

2.4.27-10sarge1

Alpha architecture

2.4.27-10sarge1

ARM architecture

2.4.27-2sarge1

Intel IA-32 architecture

2.4.27-10sarge1

Intel IA-64 architecture

2.4.27-10sarge1

Motorola 680x0 ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel-image-2.4.27-alpha, kernel-image-2.4.27-arm, kernel-image-2.4.27-i386, kernel-image-2.4.27-ia64, kernel-image-2.4.27-m68k, kernel-image-2.4.27-s390, kernel-image-2.4.27-sparc, kernel-patch-2.4.27-arm, kernel-patch-2.4.27-mips, kernel-patch-powerpc-2.4.27, kernel-source-2.4.27' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-0756
13891
http://www.securityfocus.com/bid/13891
17002
http://secunia.com/advisories/17002
17073
http://secunia.com/advisories/17073
18056
http://secunia.com/advisories/18056
18059
http://secunia.com/advisories/18059
ADV-2005-1878
http://www.vupen.com/english/advisories/2005/1878
DSA-921
http://www.debian.org/security/2005/dsa-921
DSA-922
http://www.debian.org/security/2005/dsa-922
FLSA:157459-2
http://www.securityfocus.com/archive/1/428058/100/0/threaded
FLSA:157459-3
http://www.securityfocus.com/archive/1/427980/100/0/threaded
RHSA-2005:514
http://www.redhat.com/support/errata/RHSA-2005-514.html
RHSA-2005:663
http://www.redhat.com/support/errata/RHSA-2005-663.html
USN-137-1
https://usn.ubuntu.com/137-1/
oval:org.mitre.oval:def:11119
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11119
Common Vulnerability Exposure (CVE) ID: CVE-2005-0757
13680
http://www.securityfocus.com/bid/13680
RHSA-2005:294
http://www.redhat.com/support/errata/RHSA-2005-294.html
oval:org.mitre.oval:def:11406
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11406
Common Vulnerability Exposure (CVE) ID: CVE-2005-1762
13904
http://www.securityfocus.com/bid/13904
15786
http://secunia.com/advisories/15786
SUSE-SA:2005:029
http://www.novell.com/linux/security/advisories/2005_29_kernel.html
USN-143-1
https://usn.ubuntu.com/143-1/
oval:org.mitre.oval:def:10630
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10630
Common Vulnerability Exposure (CVE) ID: CVE-2005-1767
14467
http://www.securityfocus.com/bid/14467
18977
http://secunia.com/advisories/18977
MDKSA-2006:044
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
SUSE-SA:2005:044
http://www.novell.com/linux/security/advisories/2005_44_kernel.html
USN-187-1
http://www.ubuntu.com/usn/usn-187-1
http://kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=51e31546a2fc46cb978da2ee0330a6a68f07541e
oval:org.mitre.oval:def:11101
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11101
Common Vulnerability Exposure (CVE) ID: CVE-2005-1768
1014442
http://securitytracker.com/id?1014442
14205
http://www.securityfocus.com/bid/14205
15980
http://secunia.com/advisories/15980
19185
http://secunia.com/advisories/19185
19607
http://secunia.com/advisories/19607
20050711 [ Suresec Advisories ] - Linux kernel ia32 compatibility (ia64/x86-64)
http://marc.info/?l=bugtraq&m=112110120216116&w=2
20060402-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
RHSA-2005:551
http://www.redhat.com/support/errata/RHSA-2005-551.html
http://www.suresec.org/advisories/adv4.pdf
oval:org.mitre.oval:def:11117
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11117
Common Vulnerability Exposure (CVE) ID: CVE-2005-2456
BugTraq ID: 14477
http://www.securityfocus.com/bid/14477
Debian Security Information: DSA-921 (Google Search)
Debian Security Information: DSA-922 (Google Search)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mail-archive.com/netdev@vger.kernel.org/msg00520.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10858
http://secunia.com/advisories/16298
http://secunia.com/advisories/16500
http://secunia.com/advisories/17826
SuSE Security Announcement: SUSE-SA:2005:050 (Google Search)
http://www.novell.com/linux/security/advisories/2005_50_kernel.html
https://usn.ubuntu.com/169-1/
XForce ISS Database: linux-kernel-xfrm-dos(21710)
https://exchange.xforce.ibmcloud.com/vulnerabilities/21710
Common Vulnerability Exposure (CVE) ID: CVE-2005-2458
BugTraq ID: 14719
http://www.securityfocus.com/bid/14719
http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://sources.redhat.com/ml/bug-gnu-utils/1999-06/msg00183.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10785
http://www.redhat.com/support/errata/RHSA-2006-0101.html
http://www.redhat.com/support/errata/RHSA-2006-0144.html
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://secunia.com/advisories/16355/
http://secunia.com/advisories/17918
http://secunia.com/advisories/18510
http://secunia.com/advisories/18684
http://secunia.com/advisories/19252
SuSE Security Announcement: SUSE-SA:2005:068 (Google Search)
http://www.securityfocus.com/archive/1/419522/100/0/threaded
Common Vulnerability Exposure (CVE) ID: CVE-2005-2459
BugTraq ID: 14720
http://www.securityfocus.com/bid/14720
http://bugs.gentoo.org/show_bug.cgi?id=94584
Common Vulnerability Exposure (CVE) ID: CVE-2005-2553
14965
http://www.securityfocus.com/bid/14965
19038
http://secunia.com/advisories/19038
SUSE-SA:2006:012
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html
http://linux.bkbits.net:8080/linux-2.4/cset%4041dd3455GwQPufrGvBJjcUOXQa3WXA
http://lkml.org/lkml/2005/1/5/245
oval:org.mitre.oval:def:9647
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9647
Common Vulnerability Exposure (CVE) ID: CVE-2005-2801
BugTraq ID: 14793
http://www.securityfocus.com/bid/14793
http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html
http://lists.debian.org/debian-kernel/2005/08/msg00238.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495
SuSE Security Announcement: SUSE-SA:2005:018 (Google Search)
http://www.novell.com/linux/security/advisories/2005_18_kernel.html
Common Vulnerability Exposure (CVE) ID: CVE-2005-2872
BugTraq ID: 14791
http://www.securityfocus.com/bid/14791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11394
Common Vulnerability Exposure (CVE) ID: CVE-2005-3275
BugTraq ID: 15531
http://www.securityfocus.com/bid/15531
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10142
http://www.redhat.com/support/errata/RHSA-2006-0140.html
http://secunia.com/advisories/18562
SGI Security Advisory: 20060402-01-U
https://usn.ubuntu.com/219-1/
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.