Executive Summary
Summary | |
---|---|
Title | New kernel packages fix potential "oops" |
Informations | |||
---|---|---|---|
Name | DSA-358 | First vendor Publication | 2003-08-05 |
Vendor | Debian | Last vendor Modification | 2003-08-13 |
Severity (Vendor) | N/A | Revision | 4 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
This advisory provides a correction to the previous kernel updates, which contained an error introduced in kernel-source-2.4.18 version 2.4.18-10. This error could result in a kernel "oops" under certain circumstances involving POSIX locks and multithreaded programs. For the stable distribution (woody) on the i386 architecture, this problem has been fixed in kernel-source-2.4.18 version 2.4.18-13, kernel-image-2.4.18-i386bf version 2.4.18-5woody4, and kernel-image-2.4.18-1-i386 version 2.4.18-11. For the stable distribution (woody) on the alpha architecture, this problem has been fixed in kernel-source-2.4.18 version 2.4.18-13 and kernel-image-2.4.18-1-alpha version 2.4.18-10. For the unstable distribution (sid) this problem has been fixed in kernel-source-2.4.20 version 2.4.20-7. We recommend that you update your kernel packages. If you are using the kernel installed by the installation system when the "bf24" option is selected (for a 2.4.x kernel), you should install the kernel-image-2.4.18-bf2.4 package. If you installed a different kernel-image package after installation, you should install the corresponding 2.4.18-1 kernel. You may use the table below as a guide. | If "uname -r" shows: | Install this package: |
Original Source
Url : http://www.debian.org/security/2003/dsa-358 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:304 | |||
Oval ID: | oval:org.mitre.oval:def:304 | ||
Title: | Red Hat Linux Kernel Serial Link Information Disclosure Vulnerability | ||
Description: | /proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0461 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:309 | |||
Oval ID: | oval:org.mitre.oval:def:309 | ||
Title: | Linux Kernel execve Race Condition Vulnerability | ||
Description: | A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0462 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:327 | |||
Oval ID: | oval:org.mitre.oval:def:327 | ||
Title: | Linux Kernel execve Read Access to Restricted File Descriptors | ||
Description: | The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0476 | Version: | 4 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:328 | |||
Oval ID: | oval:org.mitre.oval:def:328 | ||
Title: | Linux Kernel /proc/self setuid Vulnerability | ||
Description: | The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0501 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:380 | |||
Oval ID: | oval:org.mitre.oval:def:380 | ||
Title: | Insecure Design of the STP Protocol | ||
Description: | The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows attackers to modify the bridge topology. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0550 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:384 | |||
Oval ID: | oval:org.mitre.oval:def:384 | ||
Title: | STP Protocol Length Verification Vulnerability | ||
Description: | The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0551 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:385 | |||
Oval ID: | oval:org.mitre.oval:def:385 | ||
Title: | Linux Kernel Bridge Forwarding Table Spoof Vulnerability | ||
Description: | Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0552 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:386 | |||
Oval ID: | oval:org.mitre.oval:def:386 | ||
Title: | Lunix Kernel NFSv3 Procedure Kernel Panic Vulnerability | ||
Description: | Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0619 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | Linux kernel |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:9330 | |||
Oval ID: | oval:org.mitre.oval:def:9330 | ||
Title: | /proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords. | ||
Description: | /proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0461 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:997 | |||
Oval ID: | oval:org.mitre.oval:def:997 | ||
Title: | Red Hat Enterprise Linux 3 Kernel Serial Link Information Disclosure Vulnerability | ||
Description: | /proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0461 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 3 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 358-1 (linux-kernel-i386, linux-kernel-alpha) File : nvt/deb_358_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 423-1 (kernel-image-2.4.17-ia64) File : nvt/deb_423_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
10298 | Linux Kernel Serial Link Information Disclosure |
10297 | Linux Kernel env_start/env_end Race Condition DoS |
10296 | Linux Kernel execve System Call Arbitrary File Descriptor Read |
10295 | Linux Kernel /proc/self System Information Disclosure |
10294 | Linux Kernel STP Protocol Bridge Topology Modification |
10293 | Linux Kernel STP Protocol Malformed Length DoS |
10292 | Linux Kernel Bridge Forwarding Table Spoofing |
4457 | Linux Kernel O_DIRECT Deleted File Retrieval or File System Corruption |
2353 | Linux Kernel NFS XDR DoS The Linux kernel contains a flaw that may allow a remote denial of service. The issue is that the "decode_fh" function in "nfs3xdr.c" fails to handle a negative size value in certain NFS calls, and will result in loss of availability for the platform. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-358.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-423.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-014.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-066.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-074.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2002-263.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-239.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-408.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-188.nasl - Type : ACT_GATHER_INFO |
2003-08-01 | Name : The remote NFS daemon is prone to a denial of service attack. File : knfs_dos.nasl - Type : ACT_KILL_HOST |
Alert History
Date | Informations |
---|---|
2016-10-18 12:06:52 |
|
2016-10-08 01:03:53 |
|
2016-08-05 12:07:37 |
|
2014-02-17 11:32:49 |
|
2013-05-11 12:18:18 |
|