Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-01918

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 10
EPSS Низкий

Описание

Множественные уязвимости пакета linux-modules-2.6.26-1-xen-amd64 операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно.

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 5 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 5:
ppc:
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-powerpc - 2.6.26-13lenny2
linux-headers-2.6.26-1-vserver-powerpc64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-powerpc-smp - 2.6.26-13lenny2
linux-image-2.6.26-1-powerpc - 2.6.26-13lenny2
linux-image-2.6.26-1-vserver-powerpc64 - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-headers-2.6.26-1-powerpc - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
linux-headers-2.6.26-1-vserver-powerpc - 2.6.26-13lenny2
linux-image-2.6.26-1-powerpc64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-powerpc64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-vserver - 2.6.26-13lenny2
linux-image-2.6.26-1-vserver-powerpc - 2.6.26-13lenny2
linux-image-2.6.26-1-powerpc-smp - 2.6.26-13lenny2
s390x:
linux-image-2.6.26-1-vserver-s390x - 2.6.26-13lenny2
linux-headers-2.6.26-1-vserver-s390x - 2.6.26-13lenny2
linux-headers-2.6.26-1-s390 - 2.6.26-13lenny2
linux-image-2.6.26-1-s390 - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
linux-image-2.6.26-1-s390x - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-s390 - 2.6.26-13lenny2
linux-image-2.6.26-1-s390-tape - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-vserver - 2.6.26-13lenny2
linux-headers-2.6.26-1-s390x - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
i686:
linux-image-2.6.26-1-vserver-686-bigmem - 2.6.26-13lenny2
linux-headers-2.6.26-1-openvz-686 - 2.6.26-13lenny2
linux-image-2.6.26-1-686-bigmem - 2.6.26-13lenny2
linux-headers-2.6.26-1-amd64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-vserver-686 - 2.6.26-13lenny2
linux-headers-2.6.26-1-686-bigmem - 2.6.26-13lenny2
linux-headers-2.6.26-1-xen-686 - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
xen-linux-system-2.6.26-1-xen-686 - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-xen - 2.6.26-13lenny2
linux-headers-2.6.26-1-vserver-686-bigmem - 2.6.26-13lenny2
linux-modules-2.6.26-1-xen-686 - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-image-2.6.26-1-xen-686 - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-openvz - 2.6.26-13lenny2
linux-image-2.6.26-1-686 - 2.6.26-13lenny2
linux-image-2.6.26-1-amd64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-686 - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-i386 - 2.6.26-13lenny2
linux-headers-2.6.26-1-486 - 2.6.26-13lenny2
linux-image-2.6.26-1-vserver-686 - 2.6.26-13lenny2
linux-image-2.6.26-1-486 - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
linux-image-2.6.26-1-openvz-686 - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-vserver - 2.6.26-13lenny2
hppa:
linux-image-2.6.26-1-parisc64 - 2.6.26-13lenny2
linux-image-2.6.26-1-parisc-smp - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-hppa - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-image-2.6.26-1-parisc64-smp - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
linux-headers-2.6.26-1-parisc64 - 2.6.26-13lenny2
linux-image-2.6.26-1-parisc - 2.6.26-13lenny2
linux-headers-2.6.26-1-parisc-smp - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-headers-2.6.26-1-parisc - 2.6.26-13lenny2
linux-headers-2.6.26-1-parisc64-smp - 2.6.26-13lenny2
sparc:
linux-headers-2.6.26-1-vserver-sparc64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-vserver - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-sparc - 2.6.26-13lenny2
linux-headers-2.6.26-1-sparc64-smp - 2.6.26-13lenny2
linux-image-2.6.26-1-sparc64-smp - 2.6.26-13lenny2
linux-headers-2.6.26-1-sparc64 - 2.6.26-13lenny2
linux-image-2.6.26-1-vserver-sparc64 - 2.6.26-13lenny2
linux-image-2.6.26-1-sparc64 - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
x86-64:
linux-headers-2.6.26-1-xen-amd64 - 2.6.26-13lenny2
linux-image-2.6.26-1-amd64 - 2.6.26-13lenny2
linux-image-2.6.26-1-openvz-amd64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-openvz - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-vserver - 2.6.26-13lenny2
linux-image-2.6.26-1-xen-amd64 - 2.6.26-13lenny2
xen-linux-system-2.6.26-1-xen-amd64 - 2.6.26-13lenny2
linux-image-2.6.26-1-vserver-amd64 - 2.6.26-13lenny2
linux-modules-2.6.26-1-xen-amd64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-xen - 2.6.26-13lenny2
linux-headers-2.6.26-1-vserver-amd64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-amd64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-amd64 - 2.6.26-13lenny2
linux-headers-2.6.26-1-openvz-amd64 - 2.6.26-13lenny2
armel:
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-image-2.6.26-1-orion5x - 2.6.26-13lenny2
linux-headers-2.6.26-1-ixp4xx - 2.6.26-13lenny2
linux-image-2.6.26-1-versatile - 2.6.26-13lenny2
linux-headers-2.6.26-1-iop32x - 2.6.26-13lenny2
linux-image-2.6.26-1-ixp4xx - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-armel - 2.6.26-13lenny2
linux-image-2.6.26-1-iop32x - 2.6.26-13lenny2
linux-headers-2.6.26-1-orion5x - 2.6.26-13lenny2
linux-headers-2.6.26-1-versatile - 2.6.26-13lenny2
alpha:
linux-headers-2.6.26-1-alpha-smp - 2.6.26-13lenny2
linux-image-2.6.26-1-alpha-smp - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-headers-2.6.26-1-alpha-generic - 2.6.26-13lenny2
linux-headers-2.6.26-1-alpha-legacy - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-alpha - 2.6.26-13lenny2
linux-image-2.6.26-1-alpha-generic - 2.6.26-13lenny2
linux-image-2.6.26-1-alpha-legacy - 2.6.26-13lenny2
ia64:
linux-image-2.6.26-1-vserver-itanium - 2.6.26-13lenny2
linux-headers-2.6.26-1-vserver-mckinley - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-image-2.6.26-1-vserver-mckinley - 2.6.26-13lenny2
linux-headers-2.6.26-1-vserver-itanium - 2.6.26-13lenny2
linux-image-2.6.26-1-mckinley - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-ia64 - 2.6.26-13lenny2
linux-image-2.6.26-1-itanium - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
linux-headers-2.6.26-1-itanium - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-headers-2.6.26-1-common-vserver - 2.6.26-13lenny2
linux-headers-2.6.26-1-mckinley - 2.6.26-13lenny2
mips:
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
linux-headers-2.6.26-1-4kc-malta - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-image-2.6.26-1-sb1-bcm91250a - 2.6.26-13lenny2
linux-image-2.6.26-1-r5k-ip32 - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-mips - 2.6.26-13lenny2
linux-headers-2.6.26-1-sb1a-bcm91480b - 2.6.26-13lenny2
linux-headers-2.6.26-1-r4k-ip22 - 2.6.26-13lenny2
linux-image-2.6.26-1-5kc-malta - 2.6.26-13lenny2
linux-image-2.6.26-1-r4k-ip22 - 2.6.26-13lenny2
linux-headers-2.6.26-1-sb1-bcm91250a - 2.6.26-13lenny2
linux-image-2.6.26-1-sb1a-bcm91480b - 2.6.26-13lenny2
linux-headers-2.6.26-1-r5k-ip32 - 2.6.26-13lenny2
linux-image-2.6.26-1-4kc-malta - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-headers-2.6.26-1-5kc-malta - 2.6.26-13lenny2
noarch:
linux-support-2.6.26-1 - 2.6.26-13lenny2
linux-patch-debian-2.6.26 - 2.6.26-13lenny2
linux-manual-2.6.26 - 2.6.26-13lenny2
linux-doc-2.6.26 - 2.6.26-13lenny2
linux-tree-2.6.26 - 2.6.26-13lenny2
linux-source-2.6.26 - 2.6.26-13lenny2
mipsel:
linux-image-2.6.26-1-5kc-malta - 2.6.26-13lenny2
linux-image-2.6.26-1-sb1a-bcm91480b - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-mipsel - 2.6.26-13lenny2
linux-headers-2.6.26-1-r5k-cobalt - 2.6.26-13lenny2
linux-headers-2.6.26-1-sb1a-bcm91480b - 2.6.26-13lenny2
linux-image-2.6.26-1-r5k-cobalt - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-headers-2.6.26-1-sb1-bcm91250a - 2.6.26-13lenny2
linux-headers-2.6.26-1-5kc-malta - 2.6.26-13lenny2
linux-image-2.6.26-1-sb1-bcm91250a - 2.6.26-13lenny2
linux-image-2.6.26-1-4kc-malta - 2.6.26-13lenny2
linux-headers-2.6.26-1-4kc-malta - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2
arm:
linux-headers-2.6.26-1-footbridge - 2.6.26-13lenny2
linux-headers-2.6.26-1-all - 2.6.26-13lenny2
linux-headers-2.6.26-1-orion5x - 2.6.26-13lenny2
linux-image-2.6.26-1-orion5x - 2.6.26-13lenny2
linux-image-2.6.26-1-ixp4xx - 2.6.26-13lenny2
linux-image-2.6.26-1-iop32x - 2.6.26-13lenny2
linux-headers-2.6.26-1-all-arm - 2.6.26-13lenny2
linux-headers-2.6.26-1-ixp4xx - 2.6.26-13lenny2
linux-headers-2.6.26-1-iop32x - 2.6.26-13lenny2
linux-libc-dev - 2.6.26-13lenny2
linux-image-2.6.26-1-footbridge - 2.6.26-13lenny2
linux-headers-2.6.26-1-common - 2.6.26-13lenny2

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 17%
0.00055
Низкий

10 Critical

CVSS2

Связанные уязвимости

ubuntu
больше 16 лет назад

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

redhat
больше 16 лет назад

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

nvd
больше 16 лет назад

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

debian
больше 16 лет назад

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2. ...

github
около 3 лет назад

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.

EPSS

Процентиль: 17%
0.00055
Низкий

10 Critical

CVSS2