Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58337
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1286-1)
Summary:The remote host is missing an update for the Debian 'linux-2.6' package(s) announced via the DSA-1286-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'linux-2.6' package(s) announced via the DSA-1286-1 advisory.

Vulnerability Insight:
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-0005

Daniel Roethlisberger discovered two buffer overflows in the cm4040 driver for the Omnikey CardMan 4040 device. A local user or malicious device could exploit this to execute arbitrary code in kernel space.

CVE-2007-0958

Santosh Eraniose reported a vulnerability that allows local users to read otherwise unreadable files by triggering a core dump while using PT_INTERP. This is related to CVE-2004-1073.

CVE-2007-1357

Jean Delvare reported a vulnerability in the appletalk subsystem. Systems with the appletalk module loaded can be triggered to crash by other systems on the local network via a malformed frame.

CVE-2007-1592

Masayuki Nakagawa discovered that flow labels were inadvertently being shared between listening sockets and child sockets. This defect can be exploited by local users to cause a DoS (Oops).

This problem has been fixed in the stable distribution in version 2.6.18.dfsg.1-12etch1.

The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update:

Debian 4.0 (etch)

fai-kernels 1.17etch1

user-mode-linux 2.6.18-1um-2etch1

We recommend that you upgrade your kernel package immediately and reboot the machine. If you have built a custom kernel from the kernel source package, you will need to rebuild to take advantage of these fixes.

Updated packages for the mips and mipsel architectures are not yet available. They will be provided later.

Affected Software/OS:
'linux-2.6' package(s) on Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-0005
20070309 Buffer Overflow in Linux Drivers for Omnikey CardMan 4040 (CVE-2007-0005)
http://www.securityfocus.com/archive/1/462300/100/0/threaded
20070615 rPSA-2007-0124-1 kernel xen
http://www.securityfocus.com/archive/1/471457
22870
http://www.securityfocus.com/bid/22870
24436
http://secunia.com/advisories/24436
24518
http://secunia.com/advisories/24518
24777
http://secunia.com/advisories/24777
24901
http://secunia.com/advisories/24901
25078
http://secunia.com/advisories/25078
25691
http://secunia.com/advisories/25691
26133
http://secunia.com/advisories/26133
26139
http://secunia.com/advisories/26139
33023
http://www.osvdb.org/33023
ADV-2007-0872
http://www.vupen.com/english/advisories/2007/0872
DSA-1286
http://www.debian.org/security/2007/dsa-1286
FEDORA-2007-335
http://fedoranews.org/cms/node/2787
FEDORA-2007-336
http://fedoranews.org/cms/node/2788
MDKSA-2007:078
http://www.mandriva.com/security/advisories?name=MDKSA-2007:078
RHSA-2007:0099
http://www.redhat.com/support/errata/RHSA-2007-0099.html
USN-486-1
http://www.ubuntu.com/usn/usn-486-1
USN-489-1
http://www.ubuntu.com/usn/usn-489-1
http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc3
https://issues.rpath.com/browse/RPL-1035
kernel-cardman4040drivers-bo(32880)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32880
oval:org.mitre.oval:def:11238
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11238
Common Vulnerability Exposure (CVE) ID: CVE-2007-0958
BugTraq ID: 22903
http://www.securityfocus.com/bid/22903
Debian Security Information: DSA-1286 (Google Search)
Debian Security Information: DSA-1304 (Google Search)
http://www.debian.org/security/2007/dsa-1304
http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
http://osvdb.org/35930
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10343
RedHat Security Advisories: RHSA-2007:0488
http://rhn.redhat.com/errata/RHSA-2007-0488.html
http://secunia.com/advisories/24482
http://secunia.com/advisories/24752
http://secunia.com/advisories/25714
http://secunia.com/advisories/25838
http://secunia.com/advisories/26289
http://www.ubuntu.com/usn/usn-451-1
Common Vulnerability Exposure (CVE) ID: CVE-2007-1357
BugTraq ID: 23376
http://www.securityfocus.com/bid/23376
Bugtraq: 20070615 rPSA-2007-0124-1 kernel xen (Google Search)
http://secunia.com/advisories/24793
http://secunia.com/advisories/25099
http://secunia.com/advisories/25226
http://secunia.com/advisories/25392
http://secunia.com/advisories/25683
http://secunia.com/advisories/25961
SuSE Security Announcement: SUSE-SA:2007:029 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html
SuSE Security Announcement: SUSE-SA:2007:030 (Google Search)
http://www.novell.com/linux/security/advisories/2007_30_kernel.html
SuSE Security Announcement: SUSE-SA:2007:035 (Google Search)
http://www.novell.com/linux/security/advisories/2007_35_kernel.html
SuSE Security Announcement: SUSE-SA:2007:043 (Google Search)
http://www.novell.com/linux/security/advisories/2007_43_kernel.html
http://www.ubuntu.com/usn/usn-464-1
http://www.vupen.com/english/advisories/2007/1340
Common Vulnerability Exposure (CVE) ID: CVE-2007-1592
BugTraq ID: 23104
http://www.securityfocus.com/bid/23104
Debian Security Information: DSA-1503 (Google Search)
http://www.debian.org/security/2008/dsa-1503
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478
http://marc.info/?l=linux-netdev&m=117406721731891&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10130
RedHat Security Advisories: RHBA-2007-0304
http://rhn.redhat.com/errata/RHBA-2007-0304.html
http://www.redhat.com/support/errata/RHSA-2007-0347.html
RedHat Security Advisories: RHSA-2007:0436
http://rhn.redhat.com/errata/RHSA-2007-0436.html
http://www.redhat.com/support/errata/RHSA-2007-0672.html
http://www.redhat.com/support/errata/RHSA-2007-0673.html
http://secunia.com/advisories/24618
http://secunia.com/advisories/25288
http://secunia.com/advisories/25630
http://secunia.com/advisories/26379
http://secunia.com/advisories/27528
http://secunia.com/advisories/29058
http://www.vupen.com/english/advisories/2007/1084
XForce ISS Database: kernel-tcpv6synrecvsoc-dos(33176)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33176
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.