Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57736
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1237)
Summary:The remote host is missing an update for the Debian 'kernel-source-2.6.8' package(s) announced via the DSA-1237 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'kernel-source-2.6.8' package(s) announced via the DSA-1237 advisory.

Vulnerability Insight:
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2005-4093

Olof Johansson reported a local DoS (Denial of Service) vulnerability on the PPC970 platform. Unprivileged users can hang the system by executing the attn instruction, which was not being disabled at boot.

CVE-2006-4538

Kirill Korotaev reported a local DoS (Denial of Service) vulnerability on the ia64 and sparc architectures. A user could cause the system to crash by executing a malformed ELF binary due to insufficient verification of the memory layout.

CVE-2006-4997

ADLab Venustech Info Ltd reported a potential remote DoS (Denial of Service) vulnerability in the IP over ATM subsystem. A remote system could cause the system to crash by sending specially crafted packets that would trigger an attempt to free an already-freed pointer resulting in a system crash.

CVE-2006-5174

Martin Schwidefsky reported a potential leak of sensitive information on s390 systems. The copy_from_user function did not clear the remaining bytes of the kernel buffer after receiving a fault on the userspace address, resulting in a leak of uninitialized kernel memory. A local user could exploit this by appending to a file from a bad address.

CVE-2006-5649

Fabio Massimo Di Nitto reported a potential remote DoS (Denial of Service) vulnerability on powerpc systems. The alignment exception only checked the exception table for -EFAULT, not for other errors. This can be exploited by a local user to cause a system crash (panic).

CVE-2006-5871

Bill Allombert reported that various mount options are ignored by smbfs when UNIX extensions are enabled. This includes the uid, gid and mode options. Client systems would silently use the server-provided settings instead of honoring these options, changing the security model. This update includes a fix from Haroldo Gamal that forces the kernel to honor these mount options. Note that, since the current versions of smbmount always pass values for these options to the kernel, it is not currently possible to activate unix extensions by omitting mount options. However, this behavior is currently consistent with the current behavior of the next Debian release, 'etch'.

The following matrix explains which kernel version for which architecture fix the problems mentioned above:

Debian 3.1 (sarge)

Source 2.4.27-10sarge5

Alpha architecture 2.4.27-10sarge5

ARM architecture 2.4.27-2sarge5

Intel IA-32 architecture 2.4.27-10sarge5

Intel IA-64 architecture 2.4.27-10sarge5

Motorola 680x0 architecture 2.4.27-3sarge5

Big endian MIPS 2.4.27-10.sarge4.040815-2

Little endian MIPS 2.4.27-10.sarge4.040815-2

PowerPC architecture 2.4.27-10sarge5

IBM S/390 architecture 2.4.27-2sarge5

Sun Sparc architecture ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kernel-source-2.6.8' package(s) on Debian 3.1.

Solution:
Please install the updated package(s).

CVSS Score:
7.1

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-4093
BugTraq ID: 19615
http://www.securityfocus.com/bid/19615
Debian Security Information: DSA-1184 (Google Search)
http://www.debian.org/security/2006/dsa-1184
Debian Security Information: DSA-1237 (Google Search)
http://www.debian.org/security/2006/dsa-1237
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10666
http://www.redhat.com/support/errata/RHSA-2006-0689.html
http://secunia.com/advisories/21563
http://secunia.com/advisories/21695
http://secunia.com/advisories/21847
http://secunia.com/advisories/21934
http://secunia.com/advisories/22093
http://secunia.com/advisories/22148
http://secunia.com/advisories/22292
http://secunia.com/advisories/22945
SuSE Security Announcement: SUSE-SA:2006:057 (Google Search)
http://www.novell.com/linux/security/advisories/2006_57_kernel.html
SuSE Security Announcement: SUSE-SR:2006:021 (Google Search)
http://www.novell.com/linux/security/advisories/2006_21_sr.html
SuSE Security Announcement: SUSE-SR:2006:022 (Google Search)
http://www.novell.com/linux/security/advisories/2006_22_sr.html
http://www.ubuntu.com/usn/usn-346-1
http://www.vupen.com/english/advisories/2006/3330
http://www.vupen.com/english/advisories/2006/3331
Common Vulnerability Exposure (CVE) ID: CVE-2006-4538
BugTraq ID: 19702
http://www.securityfocus.com/bid/19702
Debian Security Information: DSA-1233 (Google Search)
http://www.us.debian.org/security/2006/dsa-1233
http://www.us.debian.org/security/2006/dsa-1237
http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10301
RedHat Security Advisories: RHSA-2007:0014
http://rhn.redhat.com/errata/RHSA-2007-0014.html
http://www.redhat.com/support/errata/RHSA-2007-1049.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
http://secunia.com/advisories/21967
http://secunia.com/advisories/21999
http://secunia.com/advisories/23370
http://secunia.com/advisories/23395
http://secunia.com/advisories/23474
http://secunia.com/advisories/23997
http://secunia.com/advisories/24206
http://secunia.com/advisories/24482
http://secunia.com/advisories/27913
http://secunia.com/advisories/33280
SuSE Security Announcement: SUSE-SA:2006:079 (Google Search)
http://www.novell.com/linux/security/advisories/2006_79_kernel.html
http://www.ubuntu.com/usn/usn-347-1
http://www.vupen.com/english/advisories/2006/3670
Common Vulnerability Exposure (CVE) ID: CVE-2006-4997
BugTraq ID: 20363
http://www.securityfocus.com/bid/20363
Bugtraq: 20070615 rPSA-2007-0124-1 kernel xen (Google Search)
http://www.securityfocus.com/archive/1/471457
http://www.mandriva.com/security/advisories?name=MDKSA-2006:197
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388
http://www.redhat.com/support/errata/RHSA-2006-0710.html
http://www.redhat.com/support/errata/RHSA-2007-0012.html
http://www.redhat.com/support/errata/RHSA-2007-0013.html
http://securitytracker.com/id?1017526
http://secunia.com/advisories/22253
http://secunia.com/advisories/22279
http://secunia.com/advisories/22497
http://secunia.com/advisories/22762
http://secunia.com/advisories/23064
http://secunia.com/advisories/23384
http://secunia.com/advisories/23752
http://secunia.com/advisories/23788
http://secunia.com/advisories/24288
http://secunia.com/advisories/25691
http://www.ubuntu.com/usn/usn-395-1
http://www.vupen.com/english/advisories/2006/3937
http://www.vupen.com/english/advisories/2006/3999
XForce ISS Database: kernel-clipmkip-dos(29387)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387
Common Vulnerability Exposure (CVE) ID: CVE-2006-5174
BugTraq ID: 20379
http://www.securityfocus.com/bid/20379
http://lkml.org/lkml/2006/11/5/46
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9885
http://securitytracker.com/id?1017090
http://secunia.com/advisories/22289
http://www.vupen.com/english/advisories/2006/3938
XForce ISS Database: kernel-copyfromuser-information-disclosure(29378)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29378
Common Vulnerability Exposure (CVE) ID: CVE-2006-5649
BugTraq ID: 21523
http://www.securityfocus.com/bid/21523
http://secunia.com/advisories/23361
Common Vulnerability Exposure (CVE) ID: CVE-2006-5871
http://www.debian.org/security/2006/dsa-1233
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10171
http://secunia.com/advisories/25683
SuSE Security Announcement: SUSE-SA:2007:035 (Google Search)
http://www.novell.com/linux/security/advisories/2007_35_kernel.html
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.