Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.67406
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-2053-1)
Summary:The remote host is missing an update for the Debian 'linux-2.6' package(s) announced via the DSA-2053-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'linux-2.6' package(s) announced via the DSA-2053-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2009-4537

Fabian Yamaguchi reported a missing check for Ethernet frames larger than the MTU in the r8169 driver. This may allow users on the local network to crash a system, resulting in a denial of service.

CVE-2010-0727

Sachin Prabhu reported an issue in the GFS2 filesystem. Local users can trigger a BUG() altering the permissions on a locked file, resulting in a denial of service.

CVE-2010-1083

Linus Torvalds reported an issue in the USB subsystem, which may allow local users to obtain portions of sensitive kernel memory.

CVE-2010-1084

Neil Brown reported an issue in the Bluetooth subsystem that may permit remote attackers to overwrite memory through the creation of large numbers of sockets, resulting in a denial of service.

CVE-2010-1086

Ang Way Chuang reported an issue in the DVB subsystem for Digital TV adapters. By creating a specially-encoded MPEG2-TS frame, a remote attacker could cause the receiver to enter an endless loop, resulting in a denial of service.

CVE-2010-1087

Trond Myklebust reported an issue in the NFS filesystem. A local user may cause an oops by sending a fatal signal during a file truncation operation, resulting in a denial of service.

CVE-2010-1088

Al Viro reported an issue where automount symlinks may not be followed when LOOKUP_FOLLOW is not set. This has an unknown security impact.

CVE-2010-1162

Catalin Marinas reported an issue in the tty subsystem that allows local attackers to cause a kernel memory leak, possibly resulting in a denial of service.

CVE-2010-1173

Chris Guo from Nokia China and Jukka Taimisto and Olli Jarva from Codenomicon Ltd reported an issue in the SCTP subsystem that allows a remote attacker to cause a denial of service using a malformed init package.

CVE-2010-1187

Neil Hormon reported an issue in the TIPC subsystem. Local users can cause a denial of service by way of a NULL pointer dereference by sending datagrams through AF_TIPC before entering network mode.

CVE-2010-1437

Toshiyuki Okajima reported a race condition in the keyring subsystem. Local users can cause memory corruption via keyctl commands that access a keyring in the process of being deleted, resulting in a denial of service.

CVE-2010-1446

Wufei reported an issue with kgdb on the PowerPC architecture, allowing local users to write to kernel memory. Note: this issue does not affect binary kernels provided by Debian. The fix is provided for the benefit of users who build their own kernels from Debian source.

CVE-2010-1451

Brad Spengler reported an issue on the SPARC architecture that allows local users to execute non-executable pages.

This update also includes fixes a regression introduced by a previous update. See the ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux-2.6' package(s) on Debian 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-4537
BugTraq ID: 37521
http://www.securityfocus.com/bid/37521
Debian Security Information: DSA-2053 (Google Search)
http://www.debian.org/security/2010/dsa-2053
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html
http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/
http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html
http://twitter.com/dakami/statuses/7104238406
http://marc.info/?l=linux-netdev&m=126202972828626&w=2
http://www.openwall.com/lists/oss-security/2009/12/28/1
http://www.openwall.com/lists/oss-security/2009/12/29/2
http://www.openwall.com/lists/oss-security/2009/12/31/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7443
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9439
http://www.redhat.com/support/errata/RHSA-2010-0019.html
http://www.redhat.com/support/errata/RHSA-2010-0020.html
http://www.redhat.com/support/errata/RHSA-2010-0041.html
http://www.redhat.com/support/errata/RHSA-2010-0053.html
RedHat Security Advisories: RHSA-2010:0095
https://rhn.redhat.com/errata/RHSA-2010-0095.html
http://www.redhat.com/support/errata/RHSA-2010-0111.html
http://securitytracker.com/id?1023419
http://secunia.com/advisories/38031
http://secunia.com/advisories/38610
http://secunia.com/advisories/39742
http://secunia.com/advisories/39830
http://secunia.com/advisories/40645
SuSE Security Announcement: SUSE-SA:2010:023 (Google Search)
http://www.novell.com/linux/security/advisories/2010_23_kernel.html
SuSE Security Announcement: SUSE-SA:2010:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html
http://www.vupen.com/english/advisories/2010/1857
XForce ISS Database: kernel-r8169-dos(55647)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55647
Common Vulnerability Exposure (CVE) ID: CVE-2010-0727
1023809
http://securitytracker.com/id?1023809
39830
DSA-2053
MDVSA-2010:066
http://www.mandriva.com/security/advisories?name=MDVSA-2010:066
RHSA-2010:0330
http://www.redhat.com/support/errata/RHSA-2010-0330.html
RHSA-2010:0380
http://www.redhat.com/support/errata/RHSA-2010-0380.html
RHSA-2010:0521
http://www.redhat.com/support/errata/RHSA-2010-0521.html
[linux-kernel] 20100311 [PATCH 3/3] GFS2: Skip check for mandatory locks when unlocking
http://lkml.org/lkml/2010/3/11/269
[oss-security] 20100312 CVE-2010-0727 kernel: gfs/gfs2 locking code DoS flaw
http://www.openwall.com/lists/oss-security/2010/03/12/1
http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.34-rc1-next-20100312.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=570863
oval:org.mitre.oval:def:11392
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11392
Common Vulnerability Exposure (CVE) ID: CVE-2010-1083
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
http://www.securityfocus.com/archive/1/520102/100/0/threaded
http://lwn.net/Articles/375350/
http://lkml.org/lkml/2010/3/30/759
http://www.openwall.com/lists/oss-security/2010/02/17/1
http://www.openwall.com/lists/oss-security/2010/02/17/2
http://www.openwall.com/lists/oss-security/2010/02/18/7
http://www.openwall.com/lists/oss-security/2010/02/19/1
http://www.openwall.com/lists/oss-security/2010/02/18/4
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10831
http://www.redhat.com/support/errata/RHSA-2010-0394.html
http://www.redhat.com/support/errata/RHSA-2010-0723.html
http://secunia.com/advisories/46397
SuSE Security Announcement: SUSE-SA:2010:019 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00007.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-1084
BugTraq ID: 38898
http://www.securityfocus.com/bid/38898
Bugtraq: 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX (Google Search)
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://security-tracker.debian.org/tracker/CVE-2010-1084
http://www.openwall.com/lists/oss-security/2010/03/23/1
http://www.redhat.com/support/errata/RHSA-2010-0610.html
http://secunia.com/advisories/43315
Common Vulnerability Exposure (CVE) ID: CVE-2010-1086
BugTraq ID: 38479
http://www.securityfocus.com/bid/38479
http://www.openwall.com/lists/oss-security/2010/03/01/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10569
http://www.redhat.com/support/errata/RHSA-2010-0398.html
http://secunia.com/advisories/39649
Common Vulnerability Exposure (CVE) ID: CVE-2010-1087
BugTraq ID: 39569
http://www.securityfocus.com/bid/39569
http://www.openwall.com/lists/oss-security/2010/03/03/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10442
Common Vulnerability Exposure (CVE) ID: CVE-2010-1088
BugTraq ID: 39044
http://www.securityfocus.com/bid/39044
http://www.mandriva.com/security/advisories?name=MDVSA-2010:088
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
http://www.openwall.com/lists/oss-security/2010/02/24/3
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10093
Common Vulnerability Exposure (CVE) ID: CVE-2010-1162
40645
ADV-2010-1857
MDVSA-2010:198
SUSE-SA:2010:031
[oss-security] 20100414 Couple of kernel issues
http://www.openwall.com/lists/oss-security/2010/04/14/1
[oss-security] 20100414 Re: Couple of kernel issues
http://www.openwall.com/lists/oss-security/2010/04/15/1
[oss-security] 20100415 CVE request: kernel: tty: release_one_tty() forgets to put pids
http://www.openwall.com/lists/oss-security/2010/04/15/2
[oss-security] 20100415 Re: CVE request: kernel: tty: release_one_tty() forgets to put pids
http://www.openwall.com/lists/oss-security/2010/04/16/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6da8d866d0d39e9509ff826660f6a86a6757c966
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.34-rc4
https://bugzilla.redhat.com/show_bug.cgi?id=582076
Common Vulnerability Exposure (CVE) ID: CVE-2010-1173
20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
40218
http://secunia.com/advisories/40218
43315
RHSA-2010:0474
http://www.redhat.com/support/errata/RHSA-2010-0474.html
[netdev] 20100428 Re: [PATCH]: sctp: Fix skb_over_panic resulting from multiple invalid parameter errors (CVE-2010-1173) (v4)
http://article.gmane.org/gmane.linux.network/159531
[oss-security] 20100429 CVE-2010-1173 kernel: skb_over_panic resulting from multiple invalid parameter errors
http://www.openwall.com/lists/oss-security/2010/04/29/1
[oss-security] 20100429 Re: CVE-2010-1173 kernel: skb_over_panic resulting from multiple invalid parameter errors
http://marc.info/?l=oss-security&m=127251068407878&w=2
http://www.openwall.com/lists/oss-security/2010/04/29/6
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=5fa782c2f5ef6c2e4f04d3e228412c9b4a4c8809
http://kbase.redhat.com/faq/docs/DOC-31052
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
https://bugzilla.redhat.com/show_bug.cgi?id=584645
oval:org.mitre.oval:def:11416
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11416
Common Vulnerability Exposure (CVE) ID: CVE-2010-1187
BugTraq ID: 39120
http://www.securityfocus.com/bid/39120
http://www.openwall.com/lists/oss-security/2010/03/30/1
http://www.openwall.com/lists/oss-security/2010/03/31/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9832
Common Vulnerability Exposure (CVE) ID: CVE-2010-1437
39719
http://www.securityfocus.com/bid/39719
[linux-kernel] 20100422 [PATCH 0/1][BUG][IMPORTANT] KEYRINGS: find_keyring_by_name() can gain the freed keyring
http://marc.info/?l=linux-kernel&m=127192182917857&w=2
[linux-kernel] 20100430 [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring
http://marc.info/?l=linux-kernel&m=127274294622730&w=2
[linux-kernel] 20100503 Re: [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring
http://marc.info/?l=linux-kernel&m=127292492727029&w=2
[oss-security] 20100427 CVE request - kernel: find_keyring_by_name() can gain the freed keyring
http://www.openwall.com/lists/oss-security/2010/04/27/2
[oss-security] 20100427 Re: CVE request - kernel: find_keyring_by_name() can gain the freed keyring
http://www.openwall.com/lists/oss-security/2010/04/28/2
https://bugzilla.redhat.com/show_bug.cgi?id=585094
https://patchwork.kernel.org/patch/94038/
https://patchwork.kernel.org/patch/94664/
kernel-findkeyringbyname-dos(58254)
https://exchange.xforce.ibmcloud.com/vulnerabilities/58254
oval:org.mitre.oval:def:9715
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9715
Common Vulnerability Exposure (CVE) ID: CVE-2010-1446
[linux-kernel] 20100510 [071/117] kgdb: dont needlessly skip PAGE_USER test for Fsl booke
http://lkml.org/lkml/2010/5/10/458
[oss-security] 20100429 CVE request - Linux Kernel KGDB/ppc issue
http://www.openwall.com/lists/oss-security/2010/04/29/3
[oss-security] 20100429 Re: CVE request - Linux Kernel KGDB/ppc issue
http://www.openwall.com/lists/oss-security/2010/04/29/9
[oss-security] 20100430 Re: CVE request - Linux Kernel KGDB/ppc issue
http://www.openwall.com/lists/oss-security/2010/04/30/1
kernel-kgdb-memory-overwrite(58840)
https://exchange.xforce.ibmcloud.com/vulnerabilities/58840
Common Vulnerability Exposure (CVE) ID: CVE-2010-1451
[linux-sparc] 20100219 Execution possible in non-executable mappings in recent 2.6 kernels
http://marc.info/?l=linux-sparc&m=126662196902830&w=2
[linux-sparc] 20100219 Re: Execution possible in non-executable mappings in recent 2.6 kernels
http://marc.info/?l=linux-sparc&m=126662159602378&w=2
[oss-security] 20100224 kernel: execution possible in non-executable mappings in recent 2.6 kernels (SPARC only)
http://www.openwall.com/lists/oss-security/2010/02/24/1
[oss-security] 20100505 Re: CVE Request [was Re: kernel: execution possible in non-executable mappings in recent 2.6 kernels (SPARC only)]
http://www.openwall.com/lists/oss-security/2010/05/05/2
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33
CopyrightCopyright (C) 2010 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.