Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 1428-2 (linux-2.6)
The remote host is missing an update to linux-2.6
announced via advisory DSA 1428-2.

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

This is an update to DSA 1428-1 which omitted a reference to CVE-2007-5904.


Eric Sandeen provided a backport of Tejun Heo's fix for a local denial
of service vulnerability in sysfs. Under memory pressure, a dentry
structure maybe reclaimed resulting in a bad pointer dereference causing
an oops during a readdir.


Chris Evans discovered an issue with certain drivers that make use of the
Linux kernel's ieee80211 layer. A remote user could generate a malicious
802.11 frame that could result in a denial of service (crash). The ipw2100
driver is known to be affected by this issue, while the ipw2200 is
believed not to be.


Scott James Remnant diagnosed a coding error in the implementation of
ptrace which could be used by a local user to cause the kernel to enter
an infinite loop.


Przemyslaw Wegrzyn discovered an issue in the CIFS filesystem that could
allow a malicious server to cause a denial of service (crash) by overflowing
a buffer.

These problems have been fixed in the stable distribution in version

The following matrix lists additional packages that were rebuilt for
compatability with or to take advantage of this update:

Debian 4.0 (etch)
fai-kernels 1.17+etch.13etch5
user-mode-linux 2.6.18-1um-2etch.13etch5

We recommend that you upgrade your kernel package immediately and reboot


CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-3104
BugTraq ID: 24631
Debian Security Information: DSA-1428 (Google Search)
RedHat Security Advisories: RHSA-2007:0488
SuSE Security Announcement: SUSE-SA:2007:064 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2007-4997
BugTraq ID: 26337;a=commitdiff;h=04045f98e0457aba7d4e6736f37eed189c48a5f7
SuSE Security Announcement: SUSE-SA:2007:059 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:006 (Google Search)
XForce ISS Database: kernel-ieee80211-dos(38247)
Common Vulnerability Exposure (CVE) ID: CVE-2007-5500
BugTraq ID: 26477
RedHat Security Advisories: RHSA-2008:0055
SuSE Security Announcement: SUSE-SA:2007:063 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:013 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:030 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:032 (Google Search)
XForce ISS Database: linux-kernel-waittaskstopped-dos(38547)
Common Vulnerability Exposure (CVE) ID: CVE-2007-5904
BugTraq ID: 26438
Bugtraq: 20080208 rPSA-2008-0048-1 kernel (Google Search)
SuSE Security Announcement: SUSE-SA:2008:017 (Google Search)
XForce ISS Database: kernel-cifsvfs-sendreceive-bo(38450)
CopyrightCopyright (c) 2007 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2023 E-Soft Inc. All rights reserved.