|
Family: Ubuntu Local Security Checks --> Category: infos
USN47-1 : linux-source-2.6.8.1 vulnerabilities Vulnerability Scan
Vulnerability Scan Summary linux-source-2.6.8.1 vulnerabilities
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- linux-doc-2.6.8.1
- linux-headers-2.6.8.1-4
- linux-headers-2.6.8.1-4-386
- linux-headers-2.6.8.1-4-686
- linux-headers-2.6.8.1-4-686-smp
- linux-headers-2.6.8.1-4-amd64-generic
- linux-headers-2.6.8.1-4-amd64-k8
- linux-headers-2.6.8.1-4-amd64-k8-smp
- linux-headers-2.6.8.1-4-amd64-xeon
- linux-headers-2.6.8.1-4-k7
- linux-headers-2.6.8.1-4-k7-smp
- linux-headers-2.6.8.1-4-power3
- linux-headers-2.6.8.1-4-power3-smp
- linux-headers-2.6.8.
[...]
Description :
Georgi Guninski discovered two Denial of Service vulnerabilities in
the Linux kernel.
An integer overflow in the vc_resize() function caused the memory
allocation for the new screen being too short, thus causing a buffer
overflow and a kernel crash.
There was also a memory leak in the ip_options_get() function. Calling
ip_cmsg_send() very often would gradually exhaust memory.
Note: The original advisory (see URL above) also mentions a
"ip_options_get integer overflow". This was already fixed in USN-38-1
(known as CVE-2004-1016).
Solution :
Upgrade to :
- linux-doc-2.6.8.1-2.6.8.1-16.5 (Ubuntu 4.10)
- linux-headers-2.6.8.1-4-2.6.8.1-16.5 (Ubuntu 4.10)
- linux-headers-2.6.8.1-4-386-2.6.8.1-16.5 (Ubuntu 4.10)
- linux-headers-2.6.8.1-4-686-2.6.8.1-16.5 (Ubuntu 4.10)
- linux-headers-2.6.8.1-4-686-smp-2.6.8.1-16.5 (Ubuntu 4.10)
- linux-headers-2.6.8.1-4-amd64-generic-2.6.8.1-16.5 (Ubuntu 4.10)
- linux-headers-2.6.8.1-4-amd64-k8-2.6.8.1-16.5 (Ubuntu 4.10)
- linux-headers-2.6.8.1-4-amd64-k8-smp-2.6.8.1-16.5 (Ubuntu 4.10)
- linux-headers-2.6.8.1-4-a
[...]
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|