Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 1183-1 (kernel-source-2.4.27)
The remote host is missing an update to kernel-source-2.4.27
announced via advisory DSA 1183-1.

Several security related problems have been discovered in the Linux
kernel which may lead to a denial of service or even the execution of
arbitrary code. The Common Vulnerabilities and Exposures project
identifies the following problems:


A buffer overflow in NFS readlink handling allows a malicious
remote server to cause a denial of service.


Diego Calleja Garcia discovered a buffer overflow in the DVD
handling code that could be exploited by a specially crafted DVD
or USB storage device to execute arbitrary code.


A bug in the SCSI driver allows a local user to cause a denial of


Patrick McHardy discovered a bug in the SNMP NAT helper that
allows remote attackers to cause a denial of service.


A race condition in the socket buffer handling allows remote
attackers to cause a denial of service.


Wei Wang discovered a bug in the SCTP implementation that allows
local users to cause a denial of service and possibly gain root


David Miller reported a problem with the fix for CVE-2006-3745
that allows local users to crash the system using via an SCTP
socket with a certain SO_LINGER value.

The following matrix explains which kernel version for which
architecture fixes the problem mentioned above:

stable (sarge)
Source 2.4.27-10sarge4
Alpha architecture 2.4.27-10sarge4
ARM architecture 2.4.27-2sarge4
Intel IA-32 architecture 2.4.27-10sarge4
Intel IA-64 architecture 2.4.27-10sarge4
Motorola 680x0 architecture 2.4.27-3sarge4
MIPS architectures 2.4.27-10.sarge4.040815-1
PowerPC architecture 2.4.27-10sarge4
IBM S/390 2.4.27-2sarge4
Sun Sparc architecture 2.4.27-9sarge4
FAI 1.9.1sarge4
mindi-kernel 2.4.27-2sarge3
kernel-image-speakup-i386 2.4.27-1.1sarge3
systemimager 3.2.3-6sarge3

For the unstable distribution (sid) these problems won't be fixed
anymore in the 2.4 kernel series.

We recommend that you upgrade your kernel package and reboot the


CVSS Score:

CVSS Vector:

Cross-Ref: BugTraq ID: 18081
BugTraq ID: 18101
BugTraq ID: 18847
BugTraq ID: 19666
BugTraq ID: 20087
Common Vulnerability Exposure (CVE) ID: CVE-2005-4798
BugTraq ID: 20186
Debian Security Information: DSA-1183 (Google Search)
Debian Security Information: DSA-1184 (Google Search)
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2935
Bugtraq: 20060831 rPSA-2006-0162-1 kernel (Google Search)
SuSE Security Announcement: SUSE-SA:2006:042 (Google Search)
SuSE Security Announcement: SUSE-SA:2006:047 (Google Search)
SuSE Security Announcement: SUSE-SA:2006:049 (Google Search)
SuSE Security Announcement: SUSE-SA:2006:064 (Google Search)
XForce ISS Database: linux-dvdreadbca-bo(27579)
Common Vulnerability Exposure (CVE) ID: CVE-2006-1528
XForce ISS Database: kernel-sg-dos(28510)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2444
CERT/CC vulnerability note: VU#681569
XForce ISS Database: linux-snmp-nathelper-dos(26594)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2446
BugTraq ID: 19475
Common Vulnerability Exposure (CVE) ID: CVE-2006-3745
Bugtraq: 20060822 Linux Kernel SCTP Privilege Elevation Vulnerability (Google Search)
SuSE Security Announcement: SUSE-SA:2006:057 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:021 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:022 (Google Search)
XForce ISS Database: kernel-sctp-privilege-escalation(28530)
Common Vulnerability Exposure (CVE) ID: CVE-2006-4535
XForce ISS Database: kernel-sctp-dos(29011)
CopyrightCopyright (c) 2006 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2022 E-Soft Inc. All rights reserved.