Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57477
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1184-2)
Summary:The remote host is missing an update for the Debian 'fai-kernels, kernel-source-2.6.8' package(s) announced via the DSA-1184-2 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'fai-kernels, kernel-source-2.6.8' package(s) announced via the DSA-1184-2 advisory.

Vulnerability Insight:
This advisory covers the S/390 components of the recent security update for the Linux 2.6.8 kernel that were missing due to technical problems. For reference, please see the text of the original advisory.

Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2004-2660

Toshihiro Iwamoto discovered a memory leak in the handling of direct I/O writes that allows local users to cause a denial of service.

CVE-2005-4798

A buffer overflow in NFS readlink handling allows a malicious remote server to cause a denial of service.

CVE-2006-1052

Stephen Smalley discovered a bug in the SELinux ptrace handling that allows local users with ptrace permissions to change the tracer SID to the SID of another process.

CVE-2006-1343

Pavel Kankovsky discovered an information leak in the getsockopt system call which can be exploited by a local program to leak potentially sensitive memory to userspace.

CVE-2006-1528

Douglas Gilbert reported a bug in the sg driver that allows local users to cause a denial of service by performing direct I/O transfers from the sg driver to memory mapped I/O space.

CVE-2006-1855

Mattia Belletti noticed that certain debugging code left in the process management code could be exploited by a local attacker to cause a denial of service.

CVE-2006-1856

Kostik Belousov discovered a missing LSM file_permission check in the readv and writev functions which might allow attackers to bypass intended access restrictions.

CVE-2006-2444

Patrick McHardy discovered a bug in the SNMP NAT helper that allows remote attackers to cause a denial of service.

CVE-2006-2446

A race condition in the socket buffer handling allows remote attackers to cause a denial of service.

CVE-2006-2935

Diego Calleja Garcia discovered a buffer overflow in the DVD handling code that could be exploited by a specially crafted DVD USB storage device to execute arbitrary code.

CVE-2006-2936

A bug in the serial USB driver has been discovered that could be exploited by a custom made USB serial adapter to consume arbitrary amounts of memory.

CVE-2006-3468

James McKenzie discovered a denial of service vulnerability in the NFS driver. When exporting an ext3 file system over NFS, a remote attacker could exploit this to trigger a file system panic by sending a specially crafted UDP packet.

CVE-2006-3745

Wei Wang discovered a bug in the SCTP implementation that allows local users to cause a denial of service and possibly gain root privileges.

CVE-2006-4093

Olof Johansson discovered that the kernel does not disable the HID0 bit on PowerPC 970 processors which could be exploited by a local attacker to cause a denial of service.

CVE-2006-4145

A bug in the Universal Disk Format (UDF) filesystem driver could be ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'fai-kernels, kernel-source-2.6.8' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-2660
BugTraq ID: 19665
http://www.securityfocus.com/bid/19665
Debian Security Information: DSA-1184 (Google Search)
http://www.debian.org/security/2006/dsa-1184
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10165
http://www.redhat.com/support/errata/RHSA-2006-0617.html
http://secunia.com/advisories/21605
http://secunia.com/advisories/22093
http://secunia.com/advisories/22174
Common Vulnerability Exposure (CVE) ID: CVE-2005-4798
BugTraq ID: 20186
http://www.securityfocus.com/bid/20186
Debian Security Information: DSA-1183 (Google Search)
http://www.debian.org/security/2006/dsa-1183
http://www.ussg.iu.edu/hypermail/linux/kernel/0509.1/1333.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11536
http://secunia.com/advisories/20398
http://secunia.com/advisories/22082
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
http://www.novell.com/linux/security/advisories/2006-05-31.html
Common Vulnerability Exposure (CVE) ID: CVE-2006-1052
17830
http://www.securityfocus.com/bid/17830
19955
http://secunia.com/advisories/19955
20157
http://secunia.com/advisories/20157
21465
http://secunia.com/advisories/21465
22093
22417
http://secunia.com/advisories/22417
25232
http://www.osvdb.org/25232
DSA-1184
MDKSA-2006:086
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
RHSA-2006:0575
http://www.redhat.com/support/errata/RHSA-2006-0575.html
USN-281-1
https://usn.ubuntu.com/281-1/
[git-commits-head] 20060311 [PATCH] selinux: tracer SID fix
http://marc.info/?l=git-commits-head&m=114210002712363&w=2
[selinux] 20060313 [SECURITY] SELinux ptrace bug (CVE-2006-1052)
http://marc.info/?l=selinux&m=114226465106131&w=2
http://selinuxnews.org/wp/index.php/2006/03/13/security-ptrace-bug-cve-2006-1052/
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
oval:org.mitre.oval:def:10102
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10102
Common Vulnerability Exposure (CVE) ID: CVE-2006-1343
BugTraq ID: 17203
http://www.securityfocus.com/bid/17203
Bugtraq: 20060531 rPSA-2006-0087-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/435490/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
http://www.securityfocus.com/archive/1/451419/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
http://www.securityfocus.com/archive/1/451404/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451417/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451426/100/200/threaded
Debian Security Information: DSA-1097 (Google Search)
http://www.debian.org/security/2006/dsa-1097
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
http://marc.info/?l=linux-netdev&m=114148078223594&w=2
http://www.osvdb.org/29841
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10875
http://www.redhat.com/support/errata/RHSA-2006-0437.html
http://www.redhat.com/support/errata/RHSA-2006-0579.html
http://www.redhat.com/support/errata/RHSA-2006-0580.html
http://secunia.com/advisories/19357
http://secunia.com/advisories/20671
http://secunia.com/advisories/21045
http://secunia.com/advisories/21136
http://secunia.com/advisories/21983
http://secunia.com/advisories/22875
http://www.trustix.org/errata/2006/0032/
http://www.vupen.com/english/advisories/2006/2071
http://www.vupen.com/english/advisories/2006/4502
XForce ISS Database: linux-sockaddr-memory-leak(25425)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25425
Common Vulnerability Exposure (CVE) ID: CVE-2006-1528
18101
http://www.securityfocus.com/bid/18101
20237
http://secunia.com/advisories/20237
20716
http://secunia.com/advisories/20716
21045
21179
http://secunia.com/advisories/21179
21498
http://secunia.com/advisories/21498
21555
http://secunia.com/advisories/21555
21745
http://secunia.com/advisories/21745
22082
ADV-2006-3330
http://www.vupen.com/english/advisories/2006/3330
DSA-1183
MDKSA-2006:123
RHSA-2006:0493
http://www.redhat.com/support/errata/RHSA-2006-0493.html
SUSE-SA:2006:042
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
SUSE-SA:2006:047
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
USN-302-1
http://www.ubuntu.com/usn/usn-302-1
http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1
http://linux.bkbits.net:8080/linux-2.6/cset%4043220081yu9ClBQNuqSSnW_9amW7iQ
http://marc.info/?l=linux-scsi&m=112540053711489&w=2
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168791
kernel-sg-dos(28510)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28510
oval:org.mitre.oval:def:11037
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11037
Common Vulnerability Exposure (CVE) ID: CVE-2006-1855
18099
http://www.securityfocus.com/bid/18099
https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=127302
oval:org.mitre.oval:def:11235
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11235
Common Vulnerability Exposure (CVE) ID: CVE-2006-1856
18105
http://www.securityfocus.com/bid/18105
25747
http://www.osvdb.org/25747
[linux-kernel] 20060426 [PATCH] LSM: add missing hook to do_compat_readv_writev()
http://www.ussg.iu.edu/hypermail/linux/kernel/0604.3/0777.html
[linux-security-module] 20050928 readv/writev syscalls are not checked by lsm
http://lists.jammed.com/linux-security-module/2005/09/0019.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191524
oval:org.mitre.oval:def:9927
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9927
Common Vulnerability Exposure (CVE) ID: CVE-2006-2444
1016153
http://securitytracker.com/id?1016153
18081
http://www.securityfocus.com/bid/18081
20182
http://secunia.com/advisories/20182
20225
http://secunia.com/advisories/20225
21035
http://secunia.com/advisories/21035
21136
21605
21983
22174
22822
http://secunia.com/advisories/22822
25750
http://www.osvdb.org/25750
ADV-2006-1916
http://www.vupen.com/english/advisories/2006/1916
MDKSA-2006:087
http://www.mandriva.com/security/advisories?name=MDKSA-2006:087
RHSA-2006:0437
RHSA-2006:0580
RHSA-2006:0617
SUSE-SA:2006:064
http://www.novell.com/linux/security/advisories/2006_64_kernel.html
VU#681569
http://www.kb.cert.org/vuls/id/681569
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.18
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=1db6b5a66e93ff125ab871d6b3f7363412cc87e8
linux-snmp-nathelper-dos(26594)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26594
oval:org.mitre.oval:def:11318
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11318
Common Vulnerability Exposure (CVE) ID: CVE-2006-2446
19475
http://www.securityfocus.com/bid/19475
MDKSA-2007:025
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192779
oval:org.mitre.oval:def:9117
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9117
Common Vulnerability Exposure (CVE) ID: CVE-2006-2935
18847
http://www.securityfocus.com/bid/18847
20060831 rPSA-2006-0162-1 kernel
http://www.securityfocus.com/archive/1/444887/100/0/threaded
21298
http://secunia.com/advisories/21298
21614
http://secunia.com/advisories/21614
21695
http://secunia.com/advisories/21695
21934
http://secunia.com/advisories/21934
22497
http://secunia.com/advisories/22497
23064
http://secunia.com/advisories/23064
23788
http://secunia.com/advisories/23788
24288
http://secunia.com/advisories/24288
ADV-2006-2680
http://www.vupen.com/english/advisories/2006/2680
MDKSA-2006:150
MDKSA-2006:151
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
RHSA-2006:0710
http://www.redhat.com/support/errata/RHSA-2006-0710.html
RHSA-2007:0012
http://www.redhat.com/support/errata/RHSA-2007-0012.html
RHSA-2007:0013
http://www.redhat.com/support/errata/RHSA-2007-0013.html
SUSE-SA:2006:049
http://www.novell.com/linux/security/advisories/2006_49_kernel.html
USN-331-1
http://www.ubuntu.com/usn/usn-331-1
USN-346-1
http://www.ubuntu.com/usn/usn-346-1
http://bugzilla.kernel.org/show_bug.cgi?id=2966
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197670
https://issues.rpath.com/browse/RPL-611
linux-dvdreadbca-bo(27579)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27579
oval:org.mitre.oval:def:10886
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10886
Common Vulnerability Exposure (CVE) ID: CVE-2006-2936
19033
http://www.securityfocus.com/bid/19033
20060717 rPSA-2006-0130-1 kernel
http://www.securityfocus.com/archive/1/440300/100/0/threaded
20703
http://secunia.com/advisories/20703
21057
http://secunia.com/advisories/21057
24547
http://secunia.com/advisories/24547
25226
http://secunia.com/advisories/25226
25683
http://secunia.com/advisories/25683
27119
http://www.osvdb.org/27119
ADV-2006-2841
http://www.vupen.com/english/advisories/2006/2841
SUSE-SA:2007:018
http://www.novell.com/linux/security/advisories/2007_18_kernel.html
SUSE-SA:2007:021
http://www.novell.com/linux/security/advisories/2007_21_kernel.html
SUSE-SA:2007:030
http://www.novell.com/linux/security/advisories/2007_30_kernel.html
SUSE-SA:2007:035
http://www.novell.com/linux/security/advisories/2007_35_kernel.html
http://www.kernel.org/git/?p=linux/kernel/git/gregkh/patches.git%3Ba=blob%3Bh=4b4d9cfea17618b80d3ac785b701faeaf60141f1%3Bhb=396eb2aac550ec55856c6843ef9017e800c3d656
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197610
linux-ftdi-sio-dos(27807)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27807
oval:org.mitre.oval:def:10265
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10265
Common Vulnerability Exposure (CVE) ID: CVE-2006-3468
19396
http://www.securityfocus.com/bid/19396
2006-0046
http://www.trustix.org/errata/2006/0046/
21369
http://secunia.com/advisories/21369
21847
http://secunia.com/advisories/21847
22148
http://secunia.com/advisories/22148
SUSE-SA:2006:057
http://www.novell.com/linux/security/advisories/2006_57_kernel.html
SUSE-SR:2006:021
http://www.novell.com/linux/security/advisories/2006_21_sr.html
SUSE-SR:2006:022
http://www.novell.com/linux/security/advisories/2006_22_sr.html
http://lkml.org/lkml/2006/7/17/41
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=199172
oval:org.mitre.oval:def:9809
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9809
Common Vulnerability Exposure (CVE) ID: CVE-2006-3745
19666
http://www.securityfocus.com/bid/19666
20060822 Linux Kernel SCTP Privilege Elevation Vulnerability
http://archives.neohapsis.com/archives/fulldisclosure/2006-08/0600.html
http://www.securityfocus.com/archive/1/444066/100/0/threaded
21576
http://secunia.com/advisories/21576
ADV-2006-3358
http://www.vupen.com/english/advisories/2006/3358
http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.2
kernel-sctp-privilege-escalation(28530)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28530
oval:org.mitre.oval:def:10706
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10706
Common Vulnerability Exposure (CVE) ID: CVE-2006-4093
BugTraq ID: 19615
http://www.securityfocus.com/bid/19615
Debian Security Information: DSA-1237 (Google Search)
http://www.debian.org/security/2006/dsa-1237
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10666
http://www.redhat.com/support/errata/RHSA-2006-0689.html
http://secunia.com/advisories/21563
http://secunia.com/advisories/22292
http://secunia.com/advisories/22945
SuSE Security Announcement: SUSE-SA:2006:057 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:021 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:022 (Google Search)
http://www.vupen.com/english/advisories/2006/3331
Common Vulnerability Exposure (CVE) ID: CVE-2006-4145
BugTraq ID: 19562
http://www.securityfocus.com/bid/19562
Bugtraq: 20060831 rPSA-2006-0162-1 kernel (Google Search)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:182
http://lkml.org/lkml/2006/6/16/6
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10796
http://www.redhat.com/support/errata/RHSA-2008-0665.html
http://secunia.com/advisories/21515
http://secunia.com/advisories/21711
http://secunia.com/advisories/22382
http://secunia.com/advisories/23474
http://secunia.com/advisories/27227
http://secunia.com/advisories/31229
http://secunia.com/advisories/31685
SuSE Security Announcement: SUSE-SA:2006:079 (Google Search)
http://www.novell.com/linux/security/advisories/2006_79_kernel.html
SuSE Security Announcement: SUSE-SA:2007:053 (Google Search)
http://www.novell.com/linux/security/advisories/2007_53_kernel.html
http://www.vupen.com/english/advisories/2006/3308
Common Vulnerability Exposure (CVE) ID: CVE-2006-4535
BugTraq ID: 20087
http://www.securityfocus.com/bid/20087
http://www.mail-archive.com/kernel-svn-changes@lists.alioth.debian.org/msg02314.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204460
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10530
http://securitytracker.com/id?1016992
http://secunia.com/advisories/21945
http://secunia.com/advisories/21967
http://www.ubuntu.com/usn/usn-347-1
XForce ISS Database: kernel-sctp-dos(29011)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29011
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.