Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Ubuntu Local Security Checks --> Category: infos

USN263-1 : linux-source- vulnerabilities Vulnerability Scan

Vulnerability Scan Summary
linux-source- vulnerabilities

Detailed Explanation for this Vulnerability Test

Synopsis :

These remote packages are missing security patches :
- linux-doc-2.6.10
- linux-doc-2.6.12
- linux-doc-
- linux-headers-2.6.10-6
- linux-headers-2.6.10-6-386
- linux-headers-2.6.10-6-686
- linux-headers-2.6.10-6-686-smp
- linux-headers-2.6.10-6-amd64-generic
- linux-headers-2.6.10-6-amd64-k8
- linux-headers-2.6.10-6-amd64-k8-smp
- linux-headers-2.6.10-6-amd64-xeon
- linux-headers-2.6.10-6-k7
- linux-headers-2.6.10-6-k7-smp
- linux-headers-2.6.10-6-power3
- linux-headers-2.6.10-6-power3

Description :

A flaw was found in the module reference counting for loadable
protocol modules of netfilter. By performing particular socket
operations, a local attacker could exploit this to crash the kernel.
This flaw only affects Ubuntu 5.10. (CVE-2005-3359)

David Howells noticed a race condition in the add_key(), request_key()
and keyctl() functions. By modifying the length of string arguments
after the kernel acertaind their length, but before the kernel copied
them into kernel memory, a local attacker could either crash the
kernel or read random parts of kernel memory (which could potentially
contain sensitive data). (CVE-2006-0457)

An information disclosure vulnerability was discovered in the
ftruncate() function for the XFS file system. Under certain
conditions, this function could expose random unallocated blocks.
A local user could potentially exploit this to recover sensitive data
from previously deleted files. (CVE-2006-0554)

A local Denial of Service vulnerability was found in the NFS client
module. By ope

Solution :

Upgrade to :
- linux-doc-2.6.10-2.6.10-34.12 (Ubuntu 5.04)
- linux-doc-2.6.12-2.6.12-10.30 (Ubuntu 5.10)
- linux-doc- (Ubuntu 4.10)
- linux-headers-2.6.10-6-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-386-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-686-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-686-smp-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-amd64-generic-2.6.10-34.12 (Ubuntu 5.04)
- linux-headers-2.6.10-6-amd64-k8-2.6.10-34.12 (Ubuntu 5.04)
- linu

Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.