Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-00981

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 7.8
EPSS Низкий

Описание

Множественные уязвимости пакета kernel-patch-2.6.8-s390 операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно.

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 3.1 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.1:
ppc:
kernel-build-2.6.8-4-power3 - 2.6.8-12sarge7
kernel-build-2.6.8-4-power3-smp - 2.6.8-12sarge7
kernel-build-2.6.8-4-power4 - 2.6.8-12sarge7
kernel-build-2.6.8-4-power4-smp - 2.6.8-12sarge7
kernel-build-2.6.8-4-powerpc - 2.6.8-12sarge7
kernel-build-2.6.8-4-powerpc-smp - 2.6.8-12sarge7
kernel-headers-2.6.8-4 - 2.6.8-12sarge7
kernel-image-2.6.8-4-power3 - 2.6.8-12sarge7
kernel-image-2.6.8-4-power3-smp - 2.6.8-12sarge7
kernel-image-2.6.8-4-power4 - 2.6.8-12sarge7
kernel-image-2.6.8-4-power4-smp - 2.6.8-12sarge7
kernel-image-2.6.8-4-powerpc - 2.6.8-12sarge7
kernel-image-2.6.8-4-powerpc-smp - 2.6.8-12sarge7
mol-modules-2.6.8-4-powerpc - 0.9.70+2.6.8+12sarge2
mol-modules-2.6.8-4-powerpc-smp - 0.9.70+2.6.8+12sarge2
s390x:
kernel-headers-2.6.8-4 - 2.6.8-5sarge7
kernel-image-2.6.8-4-s390 - 2.6.8-5sarge7
kernel-image-2.6.8-4-s390-tape - 2.6.8-5sarge7
kernel-image-2.6.8-4-s390x - 2.6.8-5sarge7
m68k:
kernel-image-2.6.8-amiga - 2.6.8-4sarge7
kernel-image-2.6.8-atari - 2.6.8-4sarge7
kernel-image-2.6.8-bvme6000 - 2.6.8-4sarge7
kernel-image-2.6.8-hp - 2.6.8-4sarge7
kernel-image-2.6.8-mac - 2.6.8-4sarge7
kernel-image-2.6.8-mvme147 - 2.6.8-4sarge7
kernel-image-2.6.8-mvme16x - 2.6.8-4sarge7
kernel-image-2.6.8-q40 - 2.6.8-4sarge7
kernel-image-2.6.8-sun3 - 2.6.8-4sarge7
i686:
fai-kernels - 1.9.1sarge6
hostap-modules-2.4.27-3-386 - 0.3.7-1sarge2
hostap-modules-2.4.27-3-586tsc - 0.3.7-1sarge2
hostap-modules-2.4.27-3-686 - 0.3.7-1sarge2
hostap-modules-2.4.27-3-686-smp - 0.3.7-1sarge2
hostap-modules-2.4.27-3-k6 - 0.3.7-1sarge2
hostap-modules-2.4.27-3-k7 - 0.3.7-1sarge2
hostap-modules-2.4.27-3-k7-smp - 0.3.7-1sarge2
hostap-modules-2.6.8-4-386 - 0.3.7-1sarge2
hostap-modules-2.6.8-4-686 - 0.3.7-1sarge2
hostap-modules-2.6.8-4-686-smp - 0.3.7-1sarge2
hostap-modules-2.6.8-4-k7 - 0.3.7-1sarge2
hostap-modules-2.6.8-4-k7-smp - 0.3.7-1sarge2
kernel-headers-2.6.8-4 - 2.6.8-16sarge7
kernel-headers-2.6.8-4-386 - 2.6.8-16sarge7
kernel-headers-2.6.8-4-686 - 2.6.8-16sarge7
kernel-headers-2.6.8-4-686-smp - 2.6.8-16sarge7
kernel-headers-2.6.8-4-k7 - 2.6.8-16sarge7
kernel-headers-2.6.8-4-k7-smp - 2.6.8-16sarge7
kernel-image-2.6.8-4-386 - 2.6.8-16sarge7
kernel-image-2.6.8-4-686 - 2.6.8-16sarge7
kernel-image-2.6.8-4-686-smp - 2.6.8-16sarge7
kernel-image-2.6.8-4-k7 - 2.6.8-16sarge7
kernel-image-2.6.8-4-k7-smp - 2.6.8-16sarge7
kernel-headers-2.6.8-13 - 2.6.8-16sarge7
kernel-headers-2.6.8-13-amd64-generic - 2.6.8-16sarge7
kernel-headers-2.6.8-13-amd64-k8 - 2.6.8-16sarge7
kernel-headers-2.6.8-13-amd64-k8-smp - 2.6.8-16sarge7
kernel-headers-2.6.8-13-em64t-p4 - 2.6.8-16sarge7
kernel-headers-2.6.8-13-em64t-p4-smp - 2.6.8-16sarge7
kernel-image-2.6.8-13-amd64-generic - 2.6.8-16sarge7
kernel-image-2.6.8-13-amd64-k8 - 2.6.8-16sarge7
kernel-image-2.6.8-13-amd64-k8-smp - 2.6.8-16sarge7
kernel-image-2.6.8-13-em64t-p4 - 2.6.8-16sarge7
kernel-image-2.6.8-13-em64t-p4-smp - 2.6.8-16sarge7
sparc:
kernel-build-2.6.8-4 - 2.6.8-15sarge7
kernel-headers-2.6.8-4 - 2.6.8-15sarge7
kernel-headers-2.6.8-4-sparc32 - 2.6.8-15sarge7
kernel-headers-2.6.8-4-sparc64 - 2.6.8-15sarge7
kernel-headers-2.6.8-4-sparc64-smp - 2.6.8-15sarge7
kernel-image-2.6.8-4-sparc32 - 2.6.8-15sarge7
kernel-image-2.6.8-4-sparc64 - 2.6.8-15sarge7
kernel-image-2.6.8-4-sparc64-smp - 2.6.8-15sarge7
x86-64:
kernel-headers-2.6.8-13 - 2.6.8-16sarge7
kernel-headers-2.6.8-13-amd64-generic - 2.6.8-16sarge7
kernel-headers-2.6.8-13-amd64-k8 - 2.6.8-16sarge7
kernel-headers-2.6.8-13-amd64-k8-smp - 2.6.8-16sarge7
kernel-headers-2.6.8-13-em64t-p4 - 2.6.8-16sarge7
kernel-headers-2.6.8-13-em64t-p4-smp - 2.6.8-16sarge7
kernel-image-2.6.8-13-amd64-generic - 2.6.8-16sarge7
kernel-image-2.6.8-13-amd64-k8 - 2.6.8-16sarge7
kernel-image-2.6.8-13-amd64-k8-smp - 2.6.8-16sarge7
kernel-image-2.6.8-13-em64t-p4 - 2.6.8-16sarge7
kernel-image-2.6.8-13-em64t-p4-smp - 2.6.8-16sarge7
ia64:
kernel-headers-2.6-itanium - 2.6.8-14sarge7
kernel-headers-2.6-itanium-smp - 2.6.8-14sarge7
kernel-headers-2.6-mckinley - 2.6.8-14sarge7
kernel-headers-2.6-mckinley-smp - 2.6.8-14sarge7
kernel-headers-2.6.8-4 - 2.6.8-14sarge7
kernel-headers-2.6.8-4-itanium - 2.6.8-14sarge7
kernel-headers-2.6.8-4-itanium-smp - 2.6.8-14sarge7
kernel-headers-2.6.8-4-mckinley - 2.6.8-14sarge7
kernel-headers-2.6.8-4-mckinley-smp - 2.6.8-14sarge7
kernel-image-2.6-itanium - 2.6.8-14sarge7
kernel-image-2.6-itanium-smp - 2.6.8-14sarge7
kernel-image-2.6-mckinley - 2.6.8-14sarge7
kernel-image-2.6-mckinley-smp - 2.6.8-14sarge7
kernel-image-2.6.8-4-itanium - 2.6.8-14sarge7
kernel-image-2.6.8-4-itanium-smp - 2.6.8-14sarge7
kernel-image-2.6.8-4-mckinley - 2.6.8-14sarge7
kernel-image-2.6.8-4-mckinley-smp - 2.6.8-14sarge7
alpha:
kernel-headers-2.6.8-4 - 2.6.8-16sarge7
kernel-headers-2.6.8-4-generic - 2.6.8-16sarge7
kernel-headers-2.6.8-4-smp - 2.6.8-16sarge7
kernel-image-2.6.8-4-generic - 2.6.8-16sarge7
kernel-image-2.6.8-4-smp - 2.6.8-16sarge7
noarch:
kernel-patch-2.6.8-s390 - 2.6.8-5sarge7
kernel-doc-2.6.8 - 2.6.8-16sarge7
kernel-patch-debian-2.6.8 - 2.6.8-16sarge7
kernel-source-2.6.8 - 2.6.8-16sarge7
kernel-tree-2.6.8 - 2.6.8-16sarge7
hppa:
kernel-headers-2.6.8-4 - 2.6.8-6sarge7
kernel-headers-2.6.8-4-32 - 2.6.8-6sarge7
kernel-headers-2.6.8-4-32-smp - 2.6.8-6sarge7
kernel-headers-2.6.8-4-64 - 2.6.8-6sarge7
kernel-headers-2.6.8-4-64-smp - 2.6.8-6sarge7
kernel-image-2.6.8-4-32 - 2.6.8-6sarge7
kernel-image-2.6.8-4-32-smp - 2.6.8-6sarge7
kernel-image-2.6.8-4-64 - 2.6.8-6sarge7
kernel-image-2.6.8-4-64-smp - 2.6.8-6sarge7

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 14%
0.00047
Низкий

7.8 High

CVSS2

Связанные уязвимости

ubuntu
больше 19 лет назад

The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.

redhat
около 20 лет назад

The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.

nvd
больше 19 лет назад

The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.

debian
больше 19 лет назад

The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and ...

github
больше 3 лет назад

The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.

EPSS

Процентиль: 14%
0.00047
Низкий

7.8 High

CVSS2