|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 1381-2 (linux-2.6)|
The remote host is missing an update to linux-2.6
announced via advisory DSA 1381-2.
Several local vulnerabilities have been discovered in the Linux kernel
that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
The NT bit maybe leaked into the next task which can local attackers
to cause a Denial of Service (crash) on systems which run the 'amd64'
flavour kernel. The stable distribution ('etch') was not believed to
be vulnerable to this issue at the time of release, however Bastian
Blank discovered that this issue still applied to the 'xen-amd64' and
'xen-vserver-amd64' flavours, and is resolved by this DSA.
Hugh Dickins discovered a potential local DoS (panic) in hugetlbfs.
A misconversion of hugetlb_vmtruncate_list to prio_tree may allow
local users to trigger a BUG_ON() call in exit_mmap.
Wojciech Purczynski discovered a vulnerability that can be exploited
by a local user to obtain superuser privileges on x86_64 systems.
This resulted from improper clearing of the high bits of registers
during ia32 system call emulation. This vulnerability is relevant
to the Debian amd64 port as well as users of the i386 port who run
the amd64 linux-image flavour.
DSA-1378 resolved this problem for the 'amd64' flavour kernels, but
Tim Wickberg and Ralf HemmenstÃdt reported an outstanding issue with
the 'xen-amd64' and 'xen-vserver-amd64' issues that is resolved by
Alex Smith discovered an issue with the pwc driver for certain webcam
devices. If the device is removed while a userspace application has it
open, the driver will wait for userspace to close the device, resulting
in a blocked USB subsystem. This issue is of low security impact as
it requires the attacker to either have physical access to the system
or to convince a user with local access to remove the device on their
These problems have been fixed in the stable distribution in version
This is an update to DSA-1381-1 which included only amd64 binaries for
linux-2.6. Builds for all other architectures are now available, as well as
rebuilds of ancillary packages that make use of the included linux source.
The following matrix lists additional packages that were rebuilt for
compatability with or to take advantage of this update:
Debian 4.0 (etch)
We recommend that you upgrade your kernel package immediately and reboot
Common Vulnerability Exposure (CVE) ID: CVE-2006-5755|
BugTraq ID: 26060
Bugtraq: 20070615 rPSA-2007-0124-1 kernel xen (Google Search)
Debian Security Information: DSA-1381 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2007-4133
BugTraq ID: 25904
Debian Security Information: DSA-1504 (Google Search)
XForce ISS Database: kernel-hugetlbfs-dos(36925)
Common Vulnerability Exposure (CVE) ID: CVE-2007-4573
BugTraq ID: 25774
Bugtraq: 20070924 COSEINC Linux Advisory #2: IA32 System Call Emulation Vulnerability (Google Search)
Bugtraq: 20070926 Re: COSEINC Linux Advisory #2: IA32 System CallEmulation Vulnerability (Google Search)
Debian Security Information: DSA-1378 (Google Search)
SuSE Security Announcement: SUSE-SA:2007:053 (Google Search)
SuSE Security Announcement: SUSE-SA:2007:064 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2007-5093
BugTraq ID: 25504
Debian Security Information: DSA-1503 (Google Search)
RedHat Security Advisories: RHSA-2008:0972
|Copyright||Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.