Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1018] DSA-1018-2 kernel-source-2.4.27


Vulnerability Assessment Details

[DSA1018] DSA-1018-2 kernel-source-2.4.27

Vulnerability Assessment Summary
DSA-1018-2 kernel-source-2.4.27

Detailed Explanation for this Vulnerability Assessment


The original update lacked recompiled ALSA modules against the new kernel
ABI. Furthermore, kernel-latest-2.4-sparc now correctly depends on the
updated packages. For completeness we're providing the original problem description:

Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:
Martin Schwidefsky discovered that the privileged instruction SACF (Set
Address Space Control Fast) on the S/390 platform is not handled properly,
permiting for a local user to gain root rights.
A race condition permits for a local user to read the environment variables
of another process that is still spawning through /proc/.../cmdline.
A numeric casting discrepancy in sdla_xfer permits local users to read
portions of kernel memory via a large len argument which is received as an
int but cast to a short, preventing read loop from filling a buffer.
An error in the skb_checksum_help() function from the netfilter framework
has been discovered that permits the bypass of packet filter rules or
a denial of service attack.
A vulnerability in the ptrace subsystem of the IA-64 architecture can
permit local attackers to overwrite kernel memory and crash the kernel.
Tim Yamin discovered that insufficient input validation in the compressed
ISO file system (zisofs) permits a denial of service attack through
maliciously crafted ISO images.
Herbert Xu discovered that the setsockopt() function was not restricted to
users/processes with the CAP_NET_ADMIN capability. This permits attackers to
manipulate IPSEC policies or initiate a denial of service attack.
Al Viro discovered a race condition in the /proc handling of network devices.
A (local) attacker could exploit the stale reference after interface shutdown
to cause a denial of service or possibly execute code in kernel mode.
Tetsuo Handa discovered that the udp_v6_get_port() function from the IPv6 code
can be forced into an endless loop, which permits a denial of service attack.
Rudolf Polzer discovered that the kernel improperly restricts access to the
KDSKBSENT ioctl, which can possibly lead to privilege escalation.
The ptrace code using CLONE_THREAD didn't use the thread group ID to
acertain whether the caller is attaching to itself, which permits a denial
of service attack.
Yen Zheng discovered that the IPv6 flow label code modified an incorrect variable,
which could lead to memory corruption and denial of service.
Ollie Wild discovered a memory leak in the icmp_push_reply() function, which
permits denial of service through memory consumption.
Chris Wright discovered that excessive allocation of broken file lock leases
in the VFS layer can exhaust memory and fill up the system logging, which permits
denial of service.
Patrick McHardy discovered a memory leak in the ip6_input_finish() function fro
[...]

Solution : http://www.debian.org/security/2006/dsa-1018
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi

Cables, Connectors


WD 2TB Certified Refurbished Elements, External Hard Drive - RWDBU6Y0020BBK-WESN picture

WD 2TB Certified Refurbished Elements, External Hard Drive - RWDBU6Y0020BBK-WESN

$49.99



Western Digital 4TB WD Purple Surveillance HDD, Internal Hard Drive - WD43PURZ picture

Western Digital 4TB WD Purple Surveillance HDD, Internal Hard Drive - WD43PURZ

$96.99



Seagate ST9450404SS 9PY066-080 Savvio 450GB 10K 10k 2.5

Seagate ST9450404SS 9PY066-080 Savvio 450GB 10K 10k 2.5" 6G SAS Hard Drive

$15.00



Seagate Exos X16 ST14000NM001G 14TB 512E SATA 6Gb/s 3.5

Seagate Exos X16 ST14000NM001G 14TB 512E SATA 6Gb/s 3.5" Enterprise Hard Drive

$169.99



HGST Ultrastar DC HC520 12TB SATA 6Gb 256MB 3.5

HGST Ultrastar DC HC520 12TB SATA 6Gb 256MB 3.5" Enterprise HDD- HUH721212ALE601

$89.99



Seagate Exos 7E10 ST2000NM000B 2TB 7200RPM SATA 6.0Gb/s 3.5

Seagate Exos 7E10 ST2000NM000B 2TB 7200RPM SATA 6.0Gb/s 3.5" Internal Hard Drive

$29.99



HGST Ultrastar HE10 HUH721010ALE600 10TB SATA 6Gb/s 7200RPM 3.5

HGST Ultrastar HE10 HUH721010ALE600 10TB SATA 6Gb/s 7200RPM 3.5" Enterprise HDD

$69.99



2TB 3.5

2TB 3.5" HDD Sata Mixed Brands hard drive Tested Formatted

$18.99



WD 16TB Elements Desktop, Certified Refurbished Hard Drive - RWDBWLG0160HBK-NESN picture

WD 16TB Elements Desktop, Certified Refurbished Hard Drive - RWDBWLG0160HBK-NESN

$209.99



2 PACK  Seagate ST1000LM035 Mobile HDD 1TB 2.5

2 PACK Seagate ST1000LM035 Mobile HDD 1TB 2.5" SATA III Laptop Hard Drive

$26.89



Discussions

No Discussions have been posted on this vulnerability.