Summary
The remote host is missing an update to kernel-source-2.4.27 announced via advisory DSA 1183-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201183-1
Insight
Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2005-4798
A buffer overflow in NFS readlink handling allows a malicious remote server to cause a denial of service.
CVE-2006-2935
Diego Calleja Garcia discovered a buffer overflow in the DVD handling code that could be exploited by a specially crafted DVD or USB storage device to execute arbitrary code.
CVE-2006-1528
A bug in the SCSI driver allows a local user to cause a denial of service.
CVE-2006-2444
Patrick McHardy discovered a bug in the SNMP NAT helper that allows remote attackers to cause a denial of service.
CVE-2006-2446
A race condition in the socket buffer handling allows remote attackers to cause a denial of service.
CVE-2006-3745
Wei Wang discovered a bug in the SCTP implementation that allows local users to cause a denial of service and possibly gain root privileges.
CVE-2006-4535
David Miller reported a problem with the fix for CVE-2006-3745 that allows local users to crash the system using via an SCTP socket with a certain SO_LINGER value.
The following matrix explains which kernel version for which architecture fixes the problem mentioned above:
stable (sarge)
Source 2.4.27-10sarge4
Alpha architecture 2.4.27-10sarge4
ARM architecture 2.4.27-2sarge4
Intel IA-32 architecture 2.4.27-10sarge4
Intel IA-64 architecture 2.4.27-10sarge4
Motorola 680x0 architecture 2.4.27-3sarge4
MIPS architectures 2.4.27-10.sarge4.040815-1 PowerPC architecture 2.4.27-10sarge4
IBM S/390 2.4.27-2sarge4
Sun Sparc architecture 2.4.27-9sarge4
FAI 1.9.1sarge4
mindi-kernel 2.4.27-2sarge3
kernel-image-speakup-i386 2.4.27-1.1sarge3
systemimager 3.2.3-6sarge3
For the unstable distribution (sid) these problems won't be fixed anymore in the 2.4 kernel series.
We recommend that you upgrade your kernel package and reboot the
Severity
Classification
-
CVE CVE-2005-4798, CVE-2006-1528, CVE-2006-2444, CVE-2006-2446, CVE-2006-2935, CVE-2006-3745, CVE-2006-4535 -
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities