Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

BDU:2015-03264

CVSS: 7.8

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации

Множественные уязвимости пакета lm-sensors-2.4.27-3-k6 операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно
Статус уязвимости:
Подтверждена производителем
Уязвимость устранена
Наличие эксплойта: Данные уточняются
Способ эксплуатации: Данные уточняются
Способ устранения: Нет данных
Меры по устранению: Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 3.1:
ppc:
kernel-patch-2.4.27-powerpc - 2.4.27-10sarge2
kernel-headers-2.4.27-powerpc - 2.4.27-10sarge2
kernel-image-2.4.27-nubus - 2.4.27-10sarge2
kernel-image-2.4.27-powerpc-small - 2.4.27-10sarge2
kernel-patch-2.4.27-nubus - 2.4.27-10sarge2
kernel-patch-2.4.27-apus - 2.4.27-10sarge2
kernel-image-2.4.27-apus - 2.4.27-10sarge2
kernel-build-2.4.27-powerpc-small - 2.4.27-10sarge2
kernel-image-2.4.27-powerpc - 2.4.27-10sarge2
kernel-build-2.4.27-apus - 2.4.27-10sarge2
kernel-build-2.4.27-powerpc - 2.4.27-10sarge2
kernel-headers-2.4.27-nubus - 2.4.27-10sarge2
kernel-image-2.4.27-powerpc-smp - 2.4.27-10sarge2
kernel-headers-2.4.27-apus - 2.4.27-10sarge2
kernel-build-2.4.27-powerpc-smp - 2.4.27-10sarge2
kernel-build-2.4.27-nubus - 2.4.27-10sarge2
s390x:
kernel-image-2.4-s390x - 2.4.27-1sarge1
kernel-image-2.4.27-3-s390 - 2.4.27-2sarge2
kernel-image-2.4-s390 - 2.4.27-1sarge1
kernel-image-2.4.27-3-s390x - 2.4.27-2sarge2
kernel-headers-2.4.27-3 - 2.4.27-2sarge2
kernel-headers-2.4-s390 - 2.4.27-1sarge1
kernel-image-2.4.27-3-s390-tape - 2.4.27-2sarge2
m68k:
kernel-image-2.4.27-mvme147 - 2.4.27-3sarge2
kernel-image-2.4.27-amiga - 2.4.27-3sarge2
kernel-image-2.4.27-mvme16x - 2.4.27-3sarge2
kernel-image-2.4.27-bvme6000 - 2.4.27-3sarge2
kernel-image-2.4.27-q40 - 2.4.27-3sarge2
kernel-image-2.4.27-atari - 2.4.27-3sarge2
kernel-image-2.4.27-mac - 2.4.27-3sarge2
i686:
kernel-image-2.4.27-speakup - 2.4.27-1.1sarge1
kernel-headers-2.4.27-3 - 2.4.27-10sarge2
kernel-image-2.4.27-3-686 - 2.4.27-10sarge2
kernel-headers-2.4-686-smp - 101sarge1
lm-sensors-2.4.27-3-k6 - 2.9.1-1sarge3
kernel-image-2.4-k6 - 101sarge1
kernel-headers-2.4.27-3-586tsc - 2.4.27-10sarge2
pcmcia-modules-2.4.27-3-k7 - 3.2.5+2sarge1
kernel-image-2.4.27-3-386 - 2.4.27-10sarge2
kernel-headers-2.4.27-3-k7-smp - 2.4.27-10sarge2
kernel-pcmcia-modules-2.4-386 - 101sarge1
lm-sensors-2.4.27-3-586tsc - 2.9.1-1sarge3
kernel-pcmcia-modules-2.4.27-3-386 - 2.4.27-10sarge2
lm-sensors-2.4.27-3-686-smp - 2.9.1-1sarge3
kernel-image-2.4-586tsc - 101sarge1
pcmcia-modules-2.4.27-3-686-smp - 3.2.5+2sarge1
pcmcia-modules-2.4.27-3-386 - 3.2.5+2sarge1
pcmcia-modules-2.4.27-3-586tsc - 3.2.5+2sarge1
kernel-pcmcia-modules-2.4.27-3-k7 - 2.4.27-10sarge2
kernel-headers-2.4-386 - 101sarge1
kernel-pcmcia-modules-2.4.27-3-686 - 2.4.27-10sarge2
kernel-headers-2.4.27-3-386 - 2.4.27-10sarge2
kernel-headers-2.4-686 - 101sarge1
kernel-image-2.4.27-3-586tsc - 2.4.27-10sarge2
mindi-kernel - 2.4.27-2sarge1
i2c-2.4.27-3-386 - 2.9.1-1sarge1
lm-sensors-2.4.27-3-386 - 2.9.1-1sarge3
kernel-pcmcia-modules-2.4.27-3-k7-smp - 2.4.27-10sarge2
kernel-headers-2.4-k7-smp - 101sarge1
kernel-pcmcia-modules-2.4.27-3-586tsc - 2.4.27-10sarge2
kernel-image-2.4.27-3-k7-smp - 2.4.27-10sarge2
kernel-image-2.4-k7 - 101sarge1
pcmcia-modules-2.4.27-3-686 - 3.2.5+2sarge1
i2c-2.4.27-3-k6 - 2.9.1-1sarge1
kernel-headers-2.4-586tsc - 101sarge1
kernel-pcmcia-modules-2.4-k7-smp - 101sarge1
kernel-headers-2.4.27-3-686 - 2.4.27-10sarge2
kernel-pcmcia-modules-2.4-586tsc - 101sarge1
kernel-pcmcia-modules-2.4.27-3-k6 - 2.4.27-10sarge2
kernel-pcmcia-modules-2.4-686 - 101sarge1
kernel-image-2.4-386 - 101sarge1
kernel-image-2.4-686 - 101sarge1
kernel-image-2.4-686-smp - 101sarge1
kernel-image-2.4-k7-smp - 101sarge1
kernel-pcmcia-modules-2.4-686-smp - 101sarge1
libsensors-dev - 2.9.1-1sarge3
kernel-image-2.4.27-3-k6 - 2.4.27-10sarge2
i2c-2.4.27-3-k7-smp - 2.9.1-1sarge1
kernel-pcmcia-modules-2.4-k6 - 101sarge1
kernel-pcmcia-modules-2.4-k7 - 101sarge1
i2c-2.4.27-3-586tsc - 2.9.1-1sarge1
kernel-image-2.4.27-3-686-smp - 2.4.27-10sarge2
lm-sensors-2.4.27-3-686 - 2.9.1-1sarge3
sensord - 2.9.1-1sarge3
pcmcia-modules-2.4.27-3-k6 - 3.2.5+2sarge1
kernel-pcmcia-modules-2.4.27-3-686-smp - 2.4.27-10sarge2
kernel-headers-2.4.27-speakup - 2.4.27-1.1sarge1
kernel-headers-2.4.27-3-686-smp - 2.4.27-10sarge2
lm-sensors-2.4.27-3-k7 - 2.9.1-1sarge3
kernel-headers-2.4.27-3-k6 - 2.4.27-10sarge2
lm-sensors - 2.9.1-1sarge3
kernel-headers-2.4-k6 - 101sarge1
i2c-2.4.27-3-686 - 2.9.1-1sarge1
i2c-2.4.27-3-686-smp - 2.9.1-1sarge1
kernel-build-2.4.27-3 - 2.4.27-10sarge2
lm-sensors-2.4.27-3-k7-smp - 2.9.1-1sarge3
i2c-2.4.27-3-k7 - 2.9.1-1sarge1
kernel-image-2.4.27-3-k7 - 2.4.27-10sarge2
kernel-headers-2.4-k7 - 101sarge1
pcmcia-modules-2.4.27-3-k7-smp - 3.2.5+2sarge1
kernel-headers-2.4.27-3-k7 - 2.4.27-10sarge2
libsensors3 - 2.9.1-1sarge3
sparc:
kernel-image-2.4-sparc32 - 42sarge1
kernel-image-2.4.27-3-sparc32-smp - 2.4.27-9sarge2
kernel-image-2.4-sparc64-smp - 42sarge1
kernel-image-2.4.27-3-sparc32 - 2.4.27-9sarge2
kernel-headers-2.4.27-3-sparc64-smp - 2.4.27-9sarge2
kernel-headers-2.4.27-3-sparc32 - 2.4.27-9sarge2
kernel-headers-2.4.27-3-sparc64 - 2.4.27-9sarge2
kernel-build-2.4.27-3 - 2.4.27-9sarge2
kernel-image-2.4-sparc32-smp - 42sarge1
kernel-headers-2.4-sparc32-smp - 42sarge1
kernel-image-2.4.27-3-sparc64 - 2.4.27-9sarge2
kernel-image-2.4.27-3-sparc64-smp - 2.4.27-9sarge2
kernel-image-2.4-sparc64 - 42sarge1
kernel-headers-2.4-sparc64 - 42sarge1
kernel-headers-2.4.27-3-sparc32-smp - 2.4.27-9sarge2
kernel-headers-2.4-sparc32 - 42sarge1
kernel-headers-2.4-sparc64-smp - 42sarge1
kernel-headers-2.4.27-3 - 2.4.27-9sarge2
alpha:
kernel-headers-2.4.27-3 - 2.4.27-10sarge2
kernel-image-2.4-smp - 101sarge1
kernel-image-2.4-generic - 101sarge1
kernel-image-2.4.27-3-generic - 2.4.27-10sarge2
kernel-image-2.4.27-3-smp - 2.4.27-10sarge2
kernel-headers-2.4.27-3-generic - 2.4.27-10sarge2
kernel-headers-2.4-generic - 101sarge1
kernel-build-2.4.27-3 - 2.4.27-10sarge2
kernel-headers-2.4.27-3-smp - 2.4.27-10sarge2
kernel-headers-2.4-smp - 101sarge1
ia64:
kernel-image-2.4.27-3-mckinley-smp - 2.4.27-10sarge2
kernel-image-2.4.27-3-itanium-smp - 2.4.27-10sarge2
kernel-image-2.4-mckinley - 2.4.27-10sarge2
kernel-headers-2.4.27-3-itanium-smp - 2.4.27-10sarge2
kernel-headers-2.4.27-3-mckinley-smp - 2.4.27-10sarge2
kernel-image-2.4-itanium - 2.4.27-10sarge2
kernel-build-2.4.27-3 - 2.4.27-10sarge2
kernel-headers-2.4.27-3-itanium - 2.4.27-10sarge2
kernel-image-2.4-mckinley-smp - 2.4.27-10sarge2
kernel-headers-2.4.27-3 - 2.4.27-10sarge2
kernel-image-2.4-itanium-smp - 2.4.27-10sarge2
kernel-image-2.4.27-3-mckinley - 2.4.27-10sarge2
kernel-headers-2.4.27-3-mckinley - 2.4.27-10sarge2
kernel-image-2.4.27-3-itanium - 2.4.27-10sarge2
mips:
kernel-image-2.4.27-r5k-ip22 - 2.4.27-10.sarge2.040815-1
kernel-image-2.4.27-r4k-ip22 - 2.4.27-10.sarge2.040815-1
kernel-image-2.4.27-sb1-swarm-bn - 2.4.27-10.sarge2.040815-1
kernel-headers-2.4.27 - 2.4.27-10.sarge2.040815-1
mips-tools - 2.4.27-10.sarge2.040815-1
noarch:
kernel-patch-debian-2.4.27 - 2.4.27-10sarge2
lm-sensors-source - 2.9.1-1sarge3
kernel-doc-2.4.27-speakup - 2.4.27-1.1sarge1
systemimager-boot-ia64-standard - 3.2.3-6sarge1
systemimager-boot-i386-standard - 3.2.3-6sarge1
i2c-source - 2.9.1-1sarge1
kernel-doc-2.4.27 - 2.4.27-10sarge2
kernel-tree-2.4.27 - 2.4.27-10sarge2
systemimager-common - 3.2.3-6sarge1
systemimager-doc - 3.2.3-6sarge1
kernel-patch-2.4-i2c - 2.9.1-1sarge1
systemimager-server - 3.2.3-6sarge1
kernel-source-2.4.27 - 2.4.27-10sarge2
systemimager-client - 3.2.3-6sarge1
systemimager-server-flamethrowerd - 3.2.3-6sarge1
kernel-patch-2.4-lm-sensors - 2.9.1-1sarge3
mipsel:
kernel-image-2.4.27-r5k-lasat - 2.4.27-10.sarge2.040815-1
kernel-image-2.4.27-r5k-cobalt - 2.4.27-10.sarge2.040815-1
kernel-image-2.4.27-xxs1500 - 2.4.27-10.sarge2.040815-1
kernel-image-2.4.27-r4k-kn04 - 2.4.27-10.sarge2.040815-1
mips-tools - 2.4.27-10.sarge2.040815-1
kernel-image-2.4.27-r3k-kn02 - 2.4.27-10.sarge2.040815-1
kernel-image-2.4.27-sb1-swarm-bn - 2.4.27-10.sarge2.040815-1
kernel-headers-2.4.27 - 2.4.27-10.sarge2.040815-1
arm:
kernel-headers-2.4.27 - 2.4.27-2sarge2
kernel-image-2.4.27-riscpc - 2.4.27-2sarge2
kernel-image-2.4.27-riscstation - 2.4.27-2sarge2
kernel-image-2.4.27-netwinder - 2.4.27-2sarge2
kernel-image-2.4.27-lart - 2.4.27-2sarge2
kernel-build-2.4.27 - 2.4.27-2sarge2
kernel-image-2.4.27-bast - 2.4.27-2sarg

Идентификаторы CVE уязвимостей

Идентификатор, базы данных общеизвестных уязвимостей информационной безопасности
Идентификатор Описание
CVE-2004-0887 SUSE Linux Enterprise Server 9 on the S/390 platform does not properly handle a certain privileged instruction, which allows...
CVE-2004-1058 Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spaw...
CVE-2004-2607 A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to r...
CVE-2005-0449 The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or...
CVE-2005-1761 Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace a...
CVE-2005-2457 The driver for compressed ISO file systems (zisofs) in the Linux kernel before 2.6.12.5 allows local users and remote attacke...
CVE-2005-2555 Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could al...
CVE-2005-2709 The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel o...
CVE-2005-2973 The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial...
CVE-2005-3257 The VT implementation (vt_ioctl.c) in Linux kernel 2.6.12, and possibly other versions including 2.6.14.4, allows local users...
CVE-2005-3783 The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 2.6.14.2, using CLONE_THREAD, does not use the thread group ID...
CVE-2005-3806 The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wron...
CVE-2005-3848 Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial...
CVE-2005-3857 The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (k...
CVE-2005-3858 Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause...
CVE-2005-4618 Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause...

CVSS

Система общей оценки уязвимостей
Оценка Severity Версия Базовый вектор
7.8 HIGH 2.0 AV:N/AC:L/Au:N/C:N/I:N/A:C

Идентификаторы других систем описаний уязвимостей

CVE-2004-0887 CVE-2004-1058 CVE-2004-2607 CVE-2005-0449 CVE-2005-1761 CVE-2005-2457 CVE-2005-2555 CVE-2005-2709 CVE-2005-2973 CVE-2005-3257 CVE-2005-3783 CVE-2005-3806 CVE-2005-3848 CVE-2005-3857 CVE-2005-3858 CVE-2005-4618 DSA-1018 ID:1401638
Вендор:
  • Сообщество свободного программного обеспечения
Тип ПО:
  • Операционная система
Наименование ПО:
  • Debian GNU/Linux
Версия ПО:
  • до 3.1 (Debian GNU/Linux)
Ссылки на источники:

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.