Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-01039

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 7.8
EPSS Низкий

Описание

Множественные уязвимости пакета linux-headers-2.6.26-2-common-xen операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно.

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 5 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 5:
ppc:
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-powerpc - 2.6.26-22lenny1
linux-headers-2.6.26-2-powerpc - 2.6.26-22lenny1
linux-headers-2.6.26-2-powerpc-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-powerpc - 2.6.26-22lenny1
linux-image-2.6.26-2-powerpc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-powerpc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-powerpc - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-headers-2.6.26-2-powerpc64 - 2.6.26-22lenny1
linux-image-2.6.26-2-powerpc - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-powerpc64 - 2.6.26-22lenny1
linux-image-2.6.26-2-powerpc-smp - 2.6.26-22lenny1
s390x:
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-s390x - 2.6.26-22lenny1
linux-headers-2.6.26-2-s390 - 2.6.26-22lenny1
linux-headers-2.6.26-2-s390x - 2.6.26-22lenny1
linux-image-2.6.26-2-s390x - 2.6.26-22lenny1
linux-image-2.6.26-2-s390-tape - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-image-2.6.26-2-s390 - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-s390x - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-s390 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
i686:
linux-headers-2.6.26-2-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-i386 - 2.6.26-22lenny1
linux-headers-2.6.26-2-xen-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-486 - 2.6.26-22lenny1
xen-linux-system-2.6.26-2-xen-686 - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-686-bigmem - 2.6.26-22lenny1
linux-image-2.6.26-2-686-bigmem - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-openvz - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-686 - 2.6.26-22lenny1
linux-image-2.6.26-2-openvz-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-modules-2.6.26-2-xen-686 - 2.6.26-22lenny1
linux-image-2.6.26-2-686 - 2.6.26-22lenny1
linux-image-2.6.26-2-xen-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-openvz-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-686-bigmem - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-686 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-xen - 2.6.26-22lenny1
linux-image-2.6.26-2-486 - 2.6.26-22lenny1
linux-image-2.6.26-2-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-686-bigmem - 2.6.26-22lenny1
hppa:
linux-headers-2.6.26-2-parisc-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-parisc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-hppa - 2.6.26-22lenny1
linux-headers-2.6.26-2-parisc - 2.6.26-22lenny1
linux-image-2.6.26-2-parisc64 - 2.6.26-22lenny1
linux-image-2.6.26-2-parisc64-smp - 2.6.26-22lenny1
linux-image-2.6.26-2-parisc - 2.6.26-22lenny1
linux-image-2.6.26-2-parisc-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-parisc64-smp - 2.6.26-22lenny1
sparc:
linux-image-2.6.26-2-sparc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-sparc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-sparc - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-sparc64 - 2.6.26-22lenny1
linux-image-2.6.26-2-sparc64-smp - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-sparc64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-sparc64-smp - 2.6.26-22lenny1
x86-64:
linux-headers-2.6.26-2-amd64 - 2.6.26-22lenny1
linux-image-2.6.26-2-xen-amd64 - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-xen-amd64 - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
xen-linux-system-2.6.26-2-xen-amd64 - 2.6.26-22lenny1
linux-modules-2.6.26-2-xen-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-amd64 - 2.6.26-22lenny1
linux-image-2.6.26-2-openvz-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-openvz - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-xen - 2.6.26-22lenny1
linux-image-2.6.26-2-amd64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-openvz-amd64 - 2.6.26-22lenny1
armel:
linux-headers-2.6.26-2-orion5x - 2.6.26-22lenny1
linux-headers-2.6.26-2-ixp4xx - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-image-2.6.26-2-ixp4xx - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-armel - 2.6.26-22lenny1
linux-image-2.6.26-2-orion5x - 2.6.26-22lenny1
linux-headers-2.6.26-2-versatile - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-image-2.6.26-2-iop32x - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-image-2.6.26-2-versatile - 2.6.26-22lenny1
linux-headers-2.6.26-2-iop32x - 2.6.26-22lenny1
alpha:
linux-headers-2.6.26-2-alpha-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-alpha-generic - 2.6.26-22lenny1
linux-image-2.6.26-2-alpha-generic - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-image-2.6.26-2-alpha-smp - 2.6.26-22lenny1
linux-headers-2.6.26-2-alpha-legacy - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-alpha - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-image-2.6.26-2-alpha-legacy - 2.6.26-22lenny1
ia64:
linux-headers-2.6.26-2-itanium - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-mckinley - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-mckinley - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common-vserver - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-mckinley - 2.6.26-22lenny1
linux-image-2.6.26-2-vserver-itanium - 2.6.26-22lenny1
linux-image-2.6.26-2-mckinley - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-image-2.6.26-2-itanium - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-ia64 - 2.6.26-22lenny1
linux-headers-2.6.26-2-vserver-itanium - 2.6.26-22lenny1
mips:
linux-headers-2.6.26-2-r4k-ip22 - 2.6.26-22lenny1
linux-image-2.6.26-2-5kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-5kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-sb1a-bcm91480b - 2.6.26-22lenny1
linux-headers-2.6.26-2-4kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-r5k-ip32 - 2.6.26-22lenny1
linux-headers-2.6.26-2-sb1-bcm91250a - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-image-2.6.26-2-4kc-malta - 2.6.26-22lenny1
linux-image-2.6.26-2-sb1-bcm91250a - 2.6.26-22lenny1
linux-image-2.6.26-2-sb1a-bcm91480b - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-mips - 2.6.26-22lenny1
linux-image-2.6.26-2-r4k-ip22 - 2.6.26-22lenny1
linux-image-2.6.26-2-r5k-ip32 - 2.6.26-22lenny1
noarch:
linux-support-2.6.26-2 - 2.6.26-22lenny1
linux-manual-2.6.26 - 2.6.26-22lenny1
linux-patch-debian-2.6.26 - 2.6.26-22lenny1
linux-source-2.6.26 - 2.6.26-22lenny1
linux-doc-2.6.26 - 2.6.26-22lenny1
linux-tree-2.6.26 - 2.6.26-22lenny1
mipsel:
linux-image-2.6.26-2-sb1-bcm91250a - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-mipsel - 2.6.26-22lenny1
linux-image-2.6.26-2-sb1a-bcm91480b - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-r5k-cobalt - 2.6.26-22lenny1
linux-headers-2.6.26-2-4kc-malta - 2.6.26-22lenny1
linux-image-2.6.26-2-4kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-sb1-bcm91250a - 2.6.26-22lenny1
linux-headers-2.6.26-2-sb1a-bcm91480b - 2.6.26-22lenny1
linux-image-2.6.26-2-5kc-malta - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-image-2.6.26-2-r5k-cobalt - 2.6.26-22lenny1
linux-headers-2.6.26-2-5kc-malta - 2.6.26-22lenny1
arm:
linux-image-2.6.26-2-iop32x - 2.6.26-22lenny1
linux-headers-2.6.26-2-footbridge - 2.6.26-22lenny1
linux-image-2.6.26-2-footbridge - 2.6.26-22lenny1
linux-headers-2.6.26-2-iop32x - 2.6.26-22lenny1
linux-image-2.6.26-2-orion5x - 2.6.26-22lenny1
linux-headers-2.6.26-2-all-arm - 2.6.26-22lenny1
linux-libc-dev - 2.6.26-22lenny1
linux-headers-2.6.26-2-common - 2.6.26-22lenny1
linux-headers-2.6.26-2-ixp4xx - 2.6.26-22lenny1
linux-image-2.6.26-2-ixp4xx - 2.6.26-22lenny1
linux-headers-2.6.26-2-all - 2.6.26-22lenny1
linux-headers-2.6.26-2-orion5x - 2.6.26-22lenny1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 29%
0.00099
Низкий

7.8 High

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application.

nvd
около 15 лет назад

The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application.

debian
около 15 лет назад

The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Li ...

github
около 3 лет назад

The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 29%
0.00099
Низкий

7.8 High

CVSS2

Уязвимость BDU:2015-01039