📄 deb_1381_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 1381-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(58641); script_cve_id("CVE-2006-5755", "CVE-2007-4133", "CVE-2007-4573", "CVE-2007-5093"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 1381-1 (linux-2.6)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to linux-2.6announced via advisory DSA 1381-1.Several local vulnerabilities have been discovered in the Linux kernelthat may lead to a denial of service or the execution of arbitrarycode. The Common Vulnerabilities and Exposures project identifies thefollowing problems:CVE-2006-5755The NT bit maybe leaked into the next task which can local attackersto cause a Denial of Service (crash) on systems which run the 'amd64'flavour kernel. The stable distribution ('etch') was not believed tobe vulnerable to this issue at the time of release, however BastianBlank discovered that this issue still applied to the 'xen-amd64' and'xen-vserver-amd64' flavours, and is resolved by this DSA.CVE-2007-4133Hugh Dickins discovered a potential local DoS (panic) in hugetlbfs.A misconversion of hugetlb_vmtruncate_list to prio_tree may allowlocal users to trigger a BUG_ON() call in exit_mmap.CVE-2007-4573Wojciech Purczynski discovered a vulnerability that can be exploitedby a local user to obtain superuser privileges on x86_64 systems.This resulted from improper clearing of the high bits of registersduring ia32 system call emulation. This vulnerability is relevantto the Debian amd64 port as well as users of the i386 port who runthe amd64 linux-image flavour.DSA-1378 resolved this problem for the 'amd64' flavour kernels, butTim Wickberg and Ralf Hemmenst胐t reported an outstanding issue withthe 'xen-amd64' and 'xen-vserver-amd64' issues that is resolved bythis DSA.CVE-2007-5093Alex Smith discovered an issue with the pwc driver for certain webcamdevices. If the device is removed while a userspace application has itopen, the driver will wait for userspace to close the device, resultingin a blocked USB subsystem. This issue is of low security impact asit requires the attacker to either have physical access to the systemor to convince a user with local access to remove the device on theirbehalf.These problems have been fixed in the stable distribution in version2.6.18.dfsg.1-13etch4.At the time of this DSA, only the build for the amd64 architecture isavailable. Due to the severity of the amd64-specific issues, we arereleasing an incomplete update. This advisory will be updated onceother architecture builds become available.We recommend that you upgrade your kernel package immediately and rebootSolution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201381-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 1381-1 (linux-2.6)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"linux-doc-2.6.18", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-manual-2.6.18", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-patch-debian-2.6.18", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-source-2.6.18", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-support-2.6.18-5", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-tree-2.6.18", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-all-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-vserver-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-vserver", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-headers-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-vserver-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-image-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"linux-modules-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(isdpkgvuln(pkg:"xen-linux-system-2.6.18-5-xen-vserver-amd64", ver:"2.6.18.dfsg.1-13etch4", rls:"DEB4.0")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -