Description: | Summary: The remote host is missing an update for the Debian 'kernel-source-2.6.8' package(s) announced via the DSA-1103 advisory.
Vulnerability Insight: Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2005-3359
Franz Filz discovered that some socket calls permit causing inconsistent reference counts on loadable modules, which allows local users to cause a denial of service.
CVE-2006-0038
'Solar Designer' discovered that arithmetic computations in netfilter's do_replace() function can lead to a buffer overflow and the execution of arbitrary code. However, the operation requires CAP_NET_ADMIN privileges, which is only an issue in virtualization systems or fine grained access control systems.
CVE-2006-0039
'Solar Designer' discovered a race condition in netfilter's do_add_counters() function, which allows information disclosure of kernel memory by exploiting a race condition. Likewise, it requires CAP_NET_ADMIN privileges.
CVE-2006-0456
David Howells discovered that the s390 assembly version of the strnlen_user() function incorrectly returns some string size values.
CVE-2006-0554
It was discovered that the ftruncate() function of XFS can expose unallocated blocks, which allows information disclosure of previously deleted files.
CVE-2006-0555
It was discovered that some NFS file operations on handles mounted with O_DIRECT can force the kernel into a crash.
CVE-2006-0557
It was discovered that the code to configure memory policies allows tricking the kernel into a crash, thus allowing denial of service.
CVE-2006-0558
It was discovered by Cliff Wickman that perfmon for the IA64 architecture allows users to trigger a BUG() assert, which allows denial of service.
CVE-2006-0741
Intel EM64T systems were discovered to be susceptible to a local DoS due to an endless recursive fault related to a bad ELF entry address.
CVE-2006-0742
Alan and Gareth discovered that the ia64 platform had an incorrectly declared die_if_kernel() function as 'does never return' which could be exploited by a local attacker resulting in a kernel crash.
CVE-2006-0744
The Linux kernel did not properly handle uncanonical return addresses on Intel EM64T CPUs, reporting exceptions in the SYSRET instead of the next instruction, causing the kernel exception handler to run on the user stack with the wrong GS. This may result in a DoS due to a local user changing the frames.
CVE-2006-1056
AMD64 machines (and other 7th and 8th generation AuthenticAMD processors) were found to be vulnerable to sensitive information leakage, due to how they handle saving and restoring the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending. This allows a process to determine portions of the state of floating point instructions of other processes.
CVE-2006-1242
Marco Ivaldi discovered that there was an unintended information disclosure allowing ... [Please see the references for more information on the vulnerabilities]
Affected Software/OS: 'kernel-source-2.6.8' package(s) on Debian 3.1.
Solution: Please install the updated package(s).
CVSS Score: 10.0
CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
|