Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Ubuntu Local Security Checks --> Category: infos

USN199-1 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities

Detailed Explanation for this Vulnerability Test

Synopsis :

These remote packages are missing security patches :
- linux-doc-2.6.10
- linux-doc-2.6.8.1
- linux-headers-2.6.10-5
- linux-headers-2.6.10-5-386
- linux-headers-2.6.10-5-686
- linux-headers-2.6.10-5-686-smp
- linux-headers-2.6.10-5-amd64-generic
- linux-headers-2.6.10-5-amd64-k8
- linux-headers-2.6.10-5-amd64-k8-smp
- linux-headers-2.6.10-5-amd64-xeon
- linux-headers-2.6.10-5-k7
- linux-headers-2.6.10-5-k7-smp
- linux-headers-2.6.10-5-power3
- linux-headers-2.6.10-5-power3-smp
- linux-header
[...]

Description :

A Denial of Service vulnerability was discovered in the
sys_set_mempolicy() function. By calling the function with a negative
first argument, a local attacker could cause a kernel crash.
(CVE-2005-3053)

A race condition was discovered in the handling of shared memory
mappings with CLONE_VM. A local attacker could exploit this to cause a
deadlock (Denial of Service) by triggering a core dump while waiting
for a thread which had just performed an exec() system call.
(CVE-2005-3106)

A race condition was found in the handling of traced processes. When
one thread was tracing another thread that shared the same memory map,
a local attacker could trigger a deadlock (Denial of Service) by
forcing a core dump when the traced thread was in the TASK_TRACED
state. (CVE-2005-3107)

A vulnerability has been found in the "ioremap" module. By performing
certain IO mapping operations, a local attacker could either read
memory pages he has not normally access to (information leak) or cause
a kernel crash (Denial of Servic
[...]

Solution :

Upgrade to :
- linux-doc-2.6.10-2.6.10-34.7 (Ubuntu 5.04)
- linux-doc-2.6.8.1-2.6.8.1-16.24 (Ubuntu 4.10)
- linux-headers-2.6.10-5-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-386-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-686-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-686-smp-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-generic-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-k8-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-k8-smp-2.6.10-34.7 (Ubuntu 5
[...]


Threat Level: High


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.