Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57711
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1233)
Summary:The remote host is missing an update for the Debian 'kernel-source-2.6.8' package(s) announced via the DSA-1233 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'kernel-source-2.6.8' package(s) announced via the DSA-1233 advisory.

Vulnerability Insight:
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2006-3741

Stephane Eranian discovered a local DoS (Denial of Service) vulnerability on the ia64 architecture. A local user could exhaust the available file descriptors by exploiting a counting error in the permonctl() system call.

CVE-2006-4538

Kirill Korotaev reported a local DoS (Denial of Service) vulnerability on the ia64 and sparc architectures. A user could cause the system to crash by executing a malformed ELF binary due to insufficient verification of the memory layout.

CVE-2006-4813

Dmitriy Monakhov reported a potential memory leak in the __block_prepare_write function. __block_prepare_write does not properly sanitize kernel buffers during error recovery, which could be exploited by local users to gain access to sensitive kernel memory.

CVE-2006-4997

ADLab Venustech Info Ltd reported a potential remote DoS (Denial of Service) vulnerability in the IP over ATM subsystem. A remote system could cause the system to crash by sending specially crafted packets that would trigger an attempt to free an already-freed pointer resulting in a system crash.

CVE-2006-5174

Martin Schwidefsky reported a potential leak of sensitive information on s390 systems. The copy_from_user function did not clear the remaining bytes of the kernel buffer after receiving a fault on the userspace address, resulting in a leak of uninitialized kernel memory. A local user could exploit this by appending to a file from a bad address.

CVE-2006-5619

James Morris reported a potential local DoS (Denial of Service) vulnerability that could be used to hang or oops a system. The seqfile handling for /proc/net/ip6_flowlabel has a flaw that can be exploited to cause an infinite loop by reading this file after creating a flowlabel.

CVE-2006-5649

Fabio Massimo Di Nitto reported a potential remote DoS (Denial of Service) vulnerability on powerpc systems. The alignment exception only checked the exception table for -EFAULT, not for other errors. This can be exploited by a local user to cause a system crash (panic).

CVE-2006-5751

Eugene Teo reported a vulnerability in the get_fdb_entries function that could potentially be exploited to allow arbitrary code execution with escalated privileges.

CVE-2006-5871

Bill Allombert reported that various mount options are ignored by smbfs when UNIX extensions are enabled. This includes the uid, gid and mode options. Client systems would silently use the server-provided settings instead of honoring these options, changing the security model. This update includes a fix from Haroldo Gamal that forces the kernel to honor these mount options. Note that, since the current versions of smbmount always pass values for these ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel-source-2.6.8' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-3741
20361
http://www.securityfocus.com/bid/20361
22279
http://secunia.com/advisories/22279
22292
http://secunia.com/advisories/22292
22382
http://secunia.com/advisories/22382
22945
http://secunia.com/advisories/22945
23370
http://secunia.com/advisories/23370
23474
http://secunia.com/advisories/23474
ADV-2006-3937
http://www.vupen.com/english/advisories/2006/3937
DSA-1233
http://www.us.debian.org/security/2006/dsa-1233
MDKSA-2006:182
http://www.mandriva.com/security/advisories?name=MDKSA-2006:182
MDKSA-2007:025
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025
RHSA-2006:0689
http://www.redhat.com/support/errata/RHSA-2006-0689.html
SUSE-SA:2006:079
http://www.novell.com/linux/security/advisories/2006_79_kernel.html
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204360
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b8444d00762703e1b6146fce12ce2684885f8bf6
kernel-sysperfmon-dos(29384)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29384
oval:org.mitre.oval:def:11250
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11250
Common Vulnerability Exposure (CVE) ID: CVE-2006-4538
BugTraq ID: 19702
http://www.securityfocus.com/bid/19702
Debian Security Information: DSA-1233 (Google Search)
Debian Security Information: DSA-1237 (Google Search)
http://www.us.debian.org/security/2006/dsa-1237
http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10301
RedHat Security Advisories: RHSA-2007:0014
http://rhn.redhat.com/errata/RHSA-2007-0014.html
http://www.redhat.com/support/errata/RHSA-2007-1049.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
http://secunia.com/advisories/21967
http://secunia.com/advisories/21999
http://secunia.com/advisories/23395
http://secunia.com/advisories/23997
http://secunia.com/advisories/24206
http://secunia.com/advisories/24482
http://secunia.com/advisories/27913
http://secunia.com/advisories/33280
SuSE Security Announcement: SUSE-SA:2006:079 (Google Search)
http://www.ubuntu.com/usn/usn-347-1
http://www.vupen.com/english/advisories/2006/3670
Common Vulnerability Exposure (CVE) ID: CVE-2006-4813
21522
http://www.securityfocus.com/bid/21522
23384
http://secunia.com/advisories/23384
23752
http://secunia.com/advisories/23752
23997
24206
31376
http://osvdb.org/31376
MDKSA-2007:012
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012
RHSA-2007:0014
USN-395-1
http://www.ubuntu.com/usn/usn-395-1
http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=152becd26e0563aefdbc4fd1fe491928efe92d1f
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207463
oval:org.mitre.oval:def:11701
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11701
Common Vulnerability Exposure (CVE) ID: CVE-2006-4997
BugTraq ID: 20363
http://www.securityfocus.com/bid/20363
Bugtraq: 20070615 rPSA-2007-0124-1 kernel xen (Google Search)
http://www.securityfocus.com/archive/1/471457
http://www.mandriva.com/security/advisories?name=MDKSA-2006:197
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388
http://www.redhat.com/support/errata/RHSA-2006-0710.html
http://www.redhat.com/support/errata/RHSA-2007-0012.html
http://www.redhat.com/support/errata/RHSA-2007-0013.html
http://securitytracker.com/id?1017526
http://secunia.com/advisories/22253
http://secunia.com/advisories/22497
http://secunia.com/advisories/22762
http://secunia.com/advisories/23064
http://secunia.com/advisories/23788
http://secunia.com/advisories/24288
http://secunia.com/advisories/25691
http://www.vupen.com/english/advisories/2006/3999
XForce ISS Database: kernel-clipmkip-dos(29387)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387
Common Vulnerability Exposure (CVE) ID: CVE-2006-5174
BugTraq ID: 20379
http://www.securityfocus.com/bid/20379
http://lkml.org/lkml/2006/11/5/46
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9885
http://securitytracker.com/id?1017090
http://secunia.com/advisories/22289
http://www.vupen.com/english/advisories/2006/3938
XForce ISS Database: kernel-copyfromuser-information-disclosure(29378)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29378
Common Vulnerability Exposure (CVE) ID: CVE-2006-5619
BugTraq ID: 20847
http://www.securityfocus.com/bid/20847
Bugtraq: 20061109 rPSA-2006-0204-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/451097/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2007:002
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9311
http://secunia.com/advisories/22665
http://secunia.com/advisories/22754
http://secunia.com/advisories/23593
http://www.vupen.com/english/advisories/2006/4297
XForce ISS Database: kernel-seqfile-ipv6-dos(29970)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29970
Common Vulnerability Exposure (CVE) ID: CVE-2006-5649
BugTraq ID: 21523
http://www.securityfocus.com/bid/21523
http://secunia.com/advisories/23361
Common Vulnerability Exposure (CVE) ID: CVE-2006-5751
BugTraq ID: 21353
http://www.securityfocus.com/bid/21353
Bugtraq: 20061206 rPSA-2006-0226-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/453681/100/0/threaded
http://projects.info-pull.com/mokb/MOKB-29-11-2006.html
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=4c61a7e0a86e1ae9e16867f9f8e4b0412b8edbaf;hp=4e4119a1213925568b8a1acdef9bf52b98b19da3;hb=ba8379b220509e9448c00a77cf6c15ac2a559cc7;f=net/bridge/br_ioctl.c
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10151
http://secunia.com/advisories/23073
http://secunia.com/advisories/23252
http://secunia.com/advisories/24547
SuSE Security Announcement: SUSE-SA:2007:021 (Google Search)
http://www.novell.com/linux/security/advisories/2007_21_kernel.html
http://www.vupen.com/english/advisories/2006/4781
XForce ISS Database: linux-getfdbentries-integer-overflow(30588)
https://exchange.xforce.ibmcloud.com/vulnerabilities/30588
Common Vulnerability Exposure (CVE) ID: CVE-2006-5871
http://www.debian.org/security/2006/dsa-1233
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10171
http://secunia.com/advisories/25683
SuSE Security Announcement: SUSE-SA:2007:035 (Google Search)
http://www.novell.com/linux/security/advisories/2007_35_kernel.html
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.