Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 1494-2 (linux-2.6)

Information

Severity

Severity

High

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.2

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to linux-2.6 announced via advisory DSA 1494-2.

Insight

Insight

The vmsplice system call did not properly verify address arguments passed by user space processes, which allowed local attackers to overwrite arbitrary kernel memory, gaining root privileges (CVE-2008-0010, CVE-2008-0600). In the vserver-enabled kernels, a missing access check on certain symlinks in /proc enabled local attackers to access resources in other vservers (CVE-2008-0163). For the stable distribution (etch), this problem has been fixed in version 2.6.18.dfsg.1-18etch1. In addition to these fixes, this update also incorporates changes from the upcoming point release of the stable distribution. Some architecture builds were not yet available at the time of DSA-1494-1. This update to DSA-1494 provides linux-2.6 packages for these remaining architectures, as well as additional binary packages that are built from source code provided by linux-2.6. The old stable distribution (sarge) is not affected by this problem. The unstable (sid) and testing distributions will be fixed soon. We recommend that you upgrade your linux-2.6, fai-kernels, and

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201494-2

Common Vulnerabilities and Exposures (CVE)