Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Ubuntu Local Security Checks --> Category: infos

USN281-1 : linux-source-2.6.10, linux-source-2.6.12 vulnerabilities Vulnerability Scan

Vulnerability Scan Summary
linux-source-2.6.10, linux-source-2.6.12 vulnerabilities

Detailed Explanation for this Vulnerability Test

Synopsis :

These remote packages are missing security patches :
- linux-doc-2.6.10
- linux-doc-2.6.12
- linux-headers-2.6.10-6
- linux-headers-2.6.10-6-386
- linux-headers-2.6.10-6-686
- linux-headers-2.6.10-6-686-smp
- linux-headers-2.6.10-6-amd64-generic
- linux-headers-2.6.10-6-amd64-k8
- linux-headers-2.6.10-6-amd64-k8-smp
- linux-headers-2.6.10-6-amd64-xeon
- linux-headers-2.6.10-6-k7
- linux-headers-2.6.10-6-k7-smp
- linux-headers-2.6.10-6-power3
- linux-headers-2.6.10-6-power3-smp
- linux-headers

Description :

The sys_mbind() function did not properly verify the validity of the
'maxnod' argument. A local user could exploit this to trigger a buffer
overflow, which caused a kernel crash. (CVE-2006-0557)

The SELinux module did not correctly handle the tracer SID when a
process was already being traced. A local attacker could exploit this
to cause a kernel crash. (CVE-2006-1052)

Al Viro discovered a local Denial of Service in the sysfs write buffer
handling. By writing a block with a length exactly equal to the
processor's page size to any writable file in /sys, a local attacker
could cause a kernel crash. (CVE-2006-1055)

John Blackwood discovered a race condition with single-step debugging
multiple processes at the same time. A local attacker could exploit
this to crash the system. This only affects the amd64 platform.

Marco Ivaldi discovered a flaw in the handling of the ID number of IP
packets. This number was incremented after receiving unsolicited TCP
SYN-ACK packets. A remote attacker coul

Solution :

Upgrade to :
- linux-doc-2.6.10-2.6.10-34.17 (Ubuntu 5.04)
- linux-doc-2.6.12-2.6.12-10.32 (Ubuntu 5.10)
- linux-headers-2.6.10-6-2.6.10-34.17 (Ubuntu 5.04)
- linux-headers-2.6.10-6-386-2.6.10-34.17 (Ubuntu 5.04)
- linux-headers-2.6.10-6-686-2.6.10-34.17 (Ubuntu 5.04)
- linux-headers-2.6.10-6-686-smp-2.6.10-34.17 (Ubuntu 5.04)
- linux-headers-2.6.10-6-amd64-generic-2.6.10-34.17 (Ubuntu 5.04)
- linux-headers-2.6.10-6-amd64-k8-2.6.10-34.17 (Ubuntu 5.04)
- linux-headers-2.6.10-6-amd64-k8-smp-2.6.10-34.17 (Ub

Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.