|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200407-16] Linux Kernel: Multiple DoS and permission vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Linux Kernel: Multiple DoS and permission vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200407-16
(Linux Kernel: Multiple DoS and permission vulnerabilities)
Workaround
2.4 users may not be affected by CVE-2004-0497 if they do not use remote
network filesystems and do not have support for any such filesystems in
their kernel configuration. All 2.6 users are affected by the /proc
attribute issue and the only known workaround is to disable /proc support.
The VServer flaw applies only to vserver-sources, and no workaround is
currently known for the issue. There is no known fix to CVE-2004-0447,
CVE-2004-0496 or CVE-2004-0565 other than to upgrade the kernel to a
patched version.
As a result, all users affected by any of these vulnerabilities should
upgrade their kernels to ensure the integrity of their systems.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0497
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0565
http://www.securityfocus.com/archive/1/367977
Solution:
Users are encouraged to upgrade to the latest available sources for their
system:
# emerge sync
# emerge -pv your-favorite-sources
# emerge your-favorite-sources
# # Follow usual procedure for compiling and installing a kernel.
# # If you use genkernel, run genkernel as you would do normally.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|