Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-02257

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 10
EPSS Низкий

Описание

Множественные уязвимости пакета kernel-headers-2.6.8-2-mckinley операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 3.1 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.1:
ppc:
kernel-headers - 102sarge1
kernel-headers-2.4 - 102sarge1
kernel-headers-2.6 - 102sarge1
kernel-image-2.4-powerpc - 102sarge1
kernel-image-2.4-powerpc-smp - 102sarge1
kernel-image-2.6-power3 - 102sarge1
kernel-image-2.6-power3-smp - 102sarge1
kernel-image-2.6-power4 - 102sarge1
kernel-image-2.6-power4-smp - 102sarge1
kernel-image-2.6-powerpc - 102sarge1
kernel-image-2.6-powerpc-smp - 102sarge1
kernel-image-power3 - 102sarge1
kernel-image-power3-smp - 102sarge1
kernel-image-power4 - 102sarge1
kernel-image-power4-smp - 102sarge1
kernel-image-powerpc - 102sarge1
kernel-image-powerpc-smp - 102sarge1
kernel-build-2.6.8-3-power3 - 2.6.8-12sarge2
kernel-build-2.6.8-3-power3-smp - 2.6.8-12sarge2
kernel-build-2.6.8-3-power4 - 2.6.8-12sarge2
kernel-build-2.6.8-3-power4-smp - 2.6.8-12sarge2
kernel-build-2.6.8-3-powerpc - 2.6.8-12sarge2
kernel-build-2.6.8-3-powerpc-smp - 2.6.8-12sarge2
kernel-build-2.6.8-power3 - 2.6.8-12sarge1
kernel-build-2.6.8-power3-smp - 2.6.8-12sarge1
kernel-build-2.6.8-power4 - 2.6.8-12sarge1
kernel-build-2.6.8-power4-smp - 2.6.8-12sarge1
kernel-build-2.6.8-powerpc - 2.6.8-12sarge1
kernel-build-2.6.8-powerpc-smp - 2.6.8-12sarge1
kernel-headers-2.6.8 - 2.6.8-12sarge1
kernel-headers-2.6.8-3 - 2.6.8-12sarge2
kernel-image-2.6.8-3-power3 - 2.6.8-12sarge2
kernel-image-2.6.8-3-power3-smp - 2.6.8-12sarge2
kernel-image-2.6.8-3-power4 - 2.6.8-12sarge2
kernel-image-2.6.8-3-power4-smp - 2.6.8-12sarge2
kernel-image-2.6.8-3-powerpc - 2.6.8-12sarge2
kernel-image-2.6.8-3-powerpc-smp - 2.6.8-12sarge2
kernel-image-2.6.8-power3 - 2.6.8-12sarge1
kernel-image-2.6.8-power3-smp - 2.6.8-12sarge1
kernel-image-2.6.8-power4 - 2.6.8-12sarge1
kernel-image-2.6.8-power4-smp - 2.6.8-12sarge1
kernel-image-2.6.8-powerpc - 2.6.8-12sarge1
kernel-image-2.6.8-powerpc-smp - 2.6.8-12sarge1
mol-modules-2.6.8-3-powerpc - 0.9.70+2.6.8+12sarge1
mol-modules-2.6.8-3-powerpc-smp - 0.9.70+2.6.8+12sarge1
s390x:
kernel-headers-2.6.8-2 - 2.6.8-5sarge1
kernel-headers-2.6.8-3 - 2.6.8-5sarge2
kernel-image-2.6.8-2-s390 - 2.6.8-5sarge1
kernel-image-2.6.8-2-s390-tape - 2.6.8-5sarge1
kernel-image-2.6.8-2-s390x - 2.6.8-5sarge1
kernel-image-2.6.8-3-s390 - 2.6.8-5sarge2
kernel-image-2.6.8-3-s390-tape - 2.6.8-5sarge2
kernel-image-2.6.8-3-s390x - 2.6.8-5sarge2
m68k:
kernel-image-2.6.8-amiga - 2.6.8-4sarge2
kernel-image-2.6.8-atari - 2.6.8-4sarge2
kernel-image-2.6.8-bvme6000 - 2.6.8-4sarge2
kernel-image-2.6.8-hp - 2.6.8-4sarge2
kernel-image-2.6.8-mac - 2.6.8-4sarge2
kernel-image-2.6.8-mvme147 - 2.6.8-4sarge2
kernel-image-2.6.8-mvme16x - 2.6.8-4sarge2
kernel-image-2.6.8-q40 - 2.6.8-4sarge2
kernel-image-2.6.8-sun3 - 2.6.8-4sarge2
i686:
kernel-headers-2.6-amd64-generic - 103sarge1
kernel-headers-2.6-amd64-k8 - 103sarge1
kernel-headers-2.6-amd64-k8-smp - 103sarge1
kernel-headers-2.6-em64t-p4 - 103sarge1
kernel-headers-2.6-em64t-p4-smp - 103sarge1
kernel-image-2.6-amd64-generic - 103sarge1
kernel-image-2.6-amd64-k8 - 103sarge1
kernel-image-2.6-amd64-k8-smp - 103sarge1
kernel-image-2.6-em64t-p4 - 103sarge1
kernel-image-2.6-em64t-p4-smp - 103sarge1
kernel-headers-2.6-386 - 101sarge1
kernel-headers-2.6-686 - 101sarge1
kernel-headers-2.6-686-smp - 101sarge1
kernel-headers-2.6-k7 - 101sarge1
kernel-headers-2.6-k7-smp - 101sarge1
kernel-image-2.6-386 - 101sarge1
kernel-image-2.6-686 - 101sarge1
kernel-image-2.6-686-smp - 101sarge1
kernel-image-2.6-k7 - 101sarge1
kernel-image-2.6-k7-smp - 101sarge1
fai-kernels - 1.9.1sarge1
kernel-headers-2.6.8-2 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-386 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-686 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-686-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-2-k7 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-k7-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-3 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-386 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-686 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-686-smp - 2.6.8-16sarge2
kernel-headers-2.6.8-3-k7 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-k7-smp - 2.6.8-16sarge2
kernel-image-2.6.8-2-386 - 2.6.8-16sarge1
kernel-image-2.6.8-2-686 - 2.6.8-16sarge1
kernel-image-2.6.8-2-686-smp - 2.6.8-16sarge1
kernel-image-2.6.8-2-k7 - 2.6.8-16sarge1
kernel-image-2.6.8-2-k7-smp - 2.6.8-16sarge1
kernel-image-2.6.8-3-386 - 2.6.8-16sarge2
kernel-image-2.6.8-3-686 - 2.6.8-16sarge2
kernel-image-2.6.8-3-686-smp - 2.6.8-16sarge2
kernel-image-2.6.8-3-k7 - 2.6.8-16sarge2
kernel-image-2.6.8-3-k7-smp - 2.6.8-16sarge2
kernel-headers-2.6.8-11 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-generic - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-12 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-generic - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8-smp - 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4-smp - 2.6.8-16sarge2
kernel-image-2.6.8-11-amd64-generic - 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8 - 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8-smp - 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4 - 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4-smp - 2.6.8-16sarge1
kernel-image-2.6.8-12-amd64-generic - 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8 - 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8-smp - 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4 - 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4-smp - 2.6.8-16sarge2
hostap-modules-2.4.27-3-386 - 0.3.7-1sarge1
hostap-modules-2.4.27-3-586tsc - 0.3.7-1sarge1
hostap-modules-2.4.27-3-686 - 0.3.7-1sarge1
hostap-modules-2.4.27-3-686-smp - 0.3.7-1sarge1
hostap-modules-2.4.27-3-k6 - 0.3.7-1sarge1
hostap-modules-2.4.27-3-k7 - 0.3.7-1sarge1
hostap-modules-2.4.27-3-k7-smp - 0.3.7-1sarge1
hostap-modules-2.6.8-3-386 - 0.3.7-1sarge1
hostap-modules-2.6.8-3-686 - 0.3.7-1sarge1
hostap-modules-2.6.8-3-686-smp - 0.3.7-1sarge1
hostap-modules-2.6.8-3-k7 - 0.3.7-1sarge1
hostap-modules-2.6.8-3-k7-smp - 0.3.7-1sarge1
ndiswrapper-modules-2.6.8-3-386 - 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-686 - 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-686-smp - 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-k7 - 1.1-2sarge1
ndiswrapper-modules-2.6.8-3-k7-smp - 1.1-2sarge1
sparc:
kernel-headers-2.6-sparc32 - 101sarge1
kernel-headers-2.6-sparc64 - 101sarge1
kernel-headers-2.6-sparc64-smp - 101sarge1
kernel-image-2.6-sparc32 - 101sarge1
kernel-image-2.6-sparc64 - 101sarge1
kernel-image-2.6-sparc64-smp - 101sarge1
kernel-build-2.6.8-2 - 2.6.8-15sarge1
kernel-build-2.6.8-3 - 2.6.8-15sarge2
kernel-headers-2.6.8-2 - 2.6.8-15sarge1
kernel-headers-2.6.8-2-sparc32 - 2.6.8-15sarge1
kernel-headers-2.6.8-2-sparc64 - 2.6.8-15sarge1
kernel-headers-2.6.8-2-sparc64-smp - 2.6.8-15sarge1
kernel-headers-2.6.8-3 - 2.6.8-15sarge2
kernel-headers-2.6.8-3-sparc32 - 2.6.8-15sarge2
kernel-headers-2.6.8-3-sparc64 - 2.6.8-15sarge2
kernel-headers-2.6.8-3-sparc64-smp - 2.6.8-15sarge2
kernel-image-2.6.8-2-sparc32 - 2.6.8-15sarge1
kernel-image-2.6.8-2-sparc64 - 2.6.8-15sarge1
kernel-image-2.6.8-2-sparc64-smp - 2.6.8-15sarge1
kernel-image-2.6.8-3-sparc32 - 2.6.8-15sarge2
kernel-image-2.6.8-3-sparc64 - 2.6.8-15sarge2
kernel-image-2.6.8-3-sparc64-smp - 2.6.8-15sarge2
x86-64:
kernel-headers-2.6-amd64-generic - 103sarge1
kernel-headers-2.6-amd64-k8 - 103sarge1
kernel-headers-2.6-amd64-k8-smp - 103sarge1
kernel-headers-2.6-em64t-p4 - 103sarge1
kernel-headers-2.6-em64t-p4-smp - 103sarge1
kernel-image-2.6-amd64-generic - 103sarge1
kernel-image-2.6-amd64-k8 - 103sarge1
kernel-image-2.6-amd64-k8-smp - 103sarge1
kernel-image-2.6-em64t-p4 - 103sarge1
kernel-image-2.6-em64t-p4-smp - 103sarge1
kernel-headers-2.6.8-11 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-generic - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-amd64-k8-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4 - 2.6.8-16sarge1
kernel-headers-2.6.8-11-em64t-p4-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-12 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-generic - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-amd64-k8-smp - 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4 - 2.6.8-16sarge2
kernel-headers-2.6.8-12-em64t-p4-smp - 2.6.8-16sarge2
kernel-image-2.6.8-11-amd64-generic - 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8 - 2.6.8-16sarge1
kernel-image-2.6.8-11-amd64-k8-smp - 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4 - 2.6.8-16sarge1
kernel-image-2.6.8-11-em64t-p4-smp - 2.6.8-16sarge1
kernel-image-2.6.8-12-amd64-generic - 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8 - 2.6.8-16sarge2
kernel-image-2.6.8-12-amd64-k8-smp - 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4 - 2.6.8-16sarge2
kernel-image-2.6.8-12-em64t-p4-smp - 2.6.8-16sarge2
ia64:
kernel-headers-2.6-itanium - 2.6.8-14sarge2
kernel-headers-2.6-itanium-smp - 2.6.8-14sarge2
kernel-headers-2.6-mckinley - 2.6.8-14sarge2
kernel-headers-2.6-mckinley-smp - 2.6.8-14sarge2
kernel-headers-2.6.8-2 - 2.6.8-14sarge1
kernel-headers-2.6.8-2-itanium - 2.6.8-14sarge1
kernel-headers-2.6.8-2-itanium-smp - 2.6.8-14sarge1
kernel-headers-2.6.8-2-mckinley - 2.6.8-14sarge1
kernel-headers-2.6.8-2-mckinley-smp - 2.6.8-14sarge1
kernel-headers-2.6.8-3 - 2.6.8-14sarge2
kernel-headers-2.6.8-3-itanium - 2.6.8-14sarge2
kernel-headers-2.6.8-3-itanium-smp - 2.6.8-14sarge2
kernel-headers-2.6.8-3-mckinley - 2.6.8-14sarge2
kernel-headers-2.6.8-3-mckinley-smp - 2.6.8-14sarge2
kernel-image-2.6-itanium - 2.6.8-14sarge2
kernel-image-2.6-itanium-smp - 2.6.8-14sarge2
kernel-image-2.6-mckinley - 2.6.8-14sarge2
kernel-image-2.6-mckinley-smp - 2.6.8-14sarge2
kernel-image-2.6.8-2-itanium - 2.6.8-14sarge1
kernel-image-2.6.8-2-itanium-smp - 2.6.8-14sarge1
kernel-image-2.6.8-2-mckinley - 2.6.8-14sarge1
kernel-image-2.6.8-2-mckinley-smp - 2.6.8-14sarge1
kernel-image-2.6.8-3-itanium - 2.6.8-14sarge2
kernel-image-2.6.8-3-itanium-smp - 2.6.8-14sarge2
kernel-image-2.6.8-3-mckinley - 2.6.8-14sarge2
kernel-image-2.6.8-3-mckinley-smp - 2.6.8-14sarge2
alpha:
kernel-headers-2.6-generic - 101sarge1
kernel-headers-2.6-smp - 101sarge1
kernel-image-2.6-generic - 101sarge1
kernel-image-2.6-smp - 101sarge1
kernel-headers-2.6.8-2 - 2.6.8-16sarge1
kernel-headers-2.6.8-2-generic - 2.6.8-16sarge1
kernel-headers-2.6.8-2-smp - 2.6.8-16sarge1
kernel-headers-2.6.8-3 - 2.6.8-16sarge2
kernel-headers-2.6.8-3-generic - 2.6.8-16sarge2
kernel-headers-2.6.8-3-smp - 2.6.8-16sarge2
kernel-image-2.6.8-2-generic - 2.6.8-16sarge1
kernel-image-2.6.8-2-smp - 2.6.8-16sarge1
kernel-image-2.6.8-3-generic - 2.6.8-16sarge2
kernel-image-2.6.8-3-smp - 2.6.8-16sarge2
noarch:
kernel-doc-2.6.8 - 2.6.8-16sarge2
kernel-patch-debian-2.6.8 - 2.6.8-16sarge2
kernel-source-2.6.8 - 2.6.8-16sarge2
kernel-tree-2.6.8 - 2.6.8-16sarg

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

EPSS

Процентиль: 19%
0.0006
Низкий

10 Critical

CVSS2

Связанные уязвимости

ubuntu
около 19 лет назад

Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call.

nvd
около 19 лет назад

Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call.

debian
около 19 лет назад

Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems wi ...

github
около 3 лет назад

Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 19%
0.0006
Низкий

10 Critical

CVSS2

Уязвимость BDU:2015-02257