|
Family: Ubuntu Local Security Checks --> Category: infos
USN137-1 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities Vulnerability Scan
Vulnerability Scan Summary linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- linux-doc-2.6.10
- linux-doc-2.6.8.1
- linux-headers-2.6.10-5
- linux-headers-2.6.10-5-386
- linux-headers-2.6.10-5-686
- linux-headers-2.6.10-5-686-smp
- linux-headers-2.6.10-5-amd64-generic
- linux-headers-2.6.10-5-amd64-k8
- linux-headers-2.6.10-5-amd64-k8-smp
- linux-headers-2.6.10-5-amd64-xeon
- linux-headers-2.6.10-5-k7
- linux-headers-2.6.10-5-k7-smp
- linux-headers-2.6.10-5-power3
- linux-headers-2.6.10-5-power3-smp
- linux-header
[...]
Description :
Alexander Nyberg discovered that ptrace() insufficiently validated
addresses on the amd64 platform so that it was possible to set an
invalid segment base. A local attacker could exploit this to crash the
kernel. This does not affect the i386 and powerpc platforms in any
way. (CVE-2005-0756)
Chris Wright discovered that the mmap() function could create illegal
memory maps (using the "mmap" function) with the start address
pointing beyond the end address. A local user could exploit this to
crash the kernel or possibly even execute arbitrary code with kernel
rights. (CVE-2005-1265)
Solution :
Upgrade to :
- linux-doc-2.6.10-2.6.10-34.2 (Ubuntu 5.04)
- linux-doc-2.6.8.1-2.6.8.1-16.19 (Ubuntu 4.10)
- linux-headers-2.6.10-5-2.6.10-34.2 (Ubuntu 5.04)
- linux-headers-2.6.10-5-386-2.6.10-34.2 (Ubuntu 5.04)
- linux-headers-2.6.10-5-686-2.6.10-34.2 (Ubuntu 5.04)
- linux-headers-2.6.10-5-686-smp-2.6.10-34.2 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-generic-2.6.10-34.2 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-k8-2.6.10-34.2 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-k8-smp-2.6.10-34.2 (Ubuntu 5
[...]
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|