Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1011] DSA-1011-1 kernel-patch-vserver


Vulnerability Assessment Details

[DSA1011] DSA-1011-1 kernel-patch-vserver

Vulnerability Assessment Summary
DSA-1011-1 kernel-patch-vserver

Detailed Explanation for this Vulnerability Assessment

Several vulnerabilities have been discovered in the Debian vserver
support for Linux. The Common Vulnerabilities and Exposures project
identifies the following problems:
Bjørn Steinbrink discovered that the chroot barrier is not set
correctly with util-vserver which may result in unauthorised
escapes from a vserver to the host system.
This vulnerability is limited to the 2.4 kernel patch included in
kernel-patch-vserver. The correction to this problem requires
updating the util-vserver package as well and installing a new
kernel built from the updated kernel-patch-vserver package.
The default policy of util-vserver is set to trust all unknown
capabilities instead of considering them as insecure.
The old stable distribution (woody) does not contain a
kernel-patch-vserver package.
For the stable distribution (sarge) this problem has been fixed in
version 1.9.5.5 of kernel-patch-vserver and in version
0.30.204-5sarge3 of util-vserver.
For the unstable distribution (sid) this problem has been fixed in
version 2.3 of kernel-patch-vserver and in version 0.30.208-1 of
util-vserver.
We recommend that you upgrade your util-vserver and
kernel-patch-vserver packages and build a new kernel immediately.


Solution : http://www.debian.org/security/2006/dsa-1011
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors


~DAILY DEALZ ~ Apple Mac Pro: Intel Xeon 32GB RAM 1TB SSD 1 Year Warranty picture

~DAILY DEALZ ~ Apple Mac Pro: Intel Xeon 32GB RAM 1TB SSD 1 Year Warranty

$284.99



Dell PowerEdge R640 Server 2x Gold 6150 2.70Ghz 36-Core 256GB 2x 960GB SSD H730P picture

Dell PowerEdge R640 Server 2x Gold 6150 2.70Ghz 36-Core 256GB 2x 960GB SSD H730P

$1737.25



Dell R730xd 12LFF 2.1Ghz 16-C 128GB H730 2x10G+2x1G NIC 2x1100W 12x Trays Rails picture

Dell R730xd 12LFF 2.1Ghz 16-C 128GB H730 2x10G+2x1G NIC 2x1100W 12x Trays Rails

$717.05



Dell R730xd 12LFF 2.6Ghz 28-C 256GB H730 2x10G+2x1G NIC 2x1100W 12x Trays Rails picture

Dell R730xd 12LFF 2.6Ghz 28-C 256GB H730 2x10G+2x1G NIC 2x1100W 12x Trays Rails

$947.05



INTEL XEON GOLD 6148 20 Core SR3B6 2.4GHZ 27.5MB Processor    @24 picture

INTEL XEON GOLD 6148 20 Core SR3B6 2.4GHZ 27.5MB Processor @24

$99.99



Intel Xeon Gold 6138 2.0GHz 27.5MB 20-Core 125W LGA3647 SR3B5 picture

Intel Xeon Gold 6138 2.0GHz 27.5MB 20-Core 125W LGA3647 SR3B5

$46.00



Intel Xeon E5-2690V2 3.00GHz 10-Core (SR1A5) Processor CPU READ DESCRIPTION picture

Intel Xeon E5-2690V2 3.00GHz 10-Core (SR1A5) Processor CPU READ DESCRIPTION

$12.00



Intel Xeon E5-2697 V4 2.30 GHz 18C 2011-3 2400MHz 45MB 145W SR2JV CPU Processor picture

Intel Xeon E5-2697 V4 2.30 GHz 18C 2011-3 2400MHz 45MB 145W SR2JV CPU Processor

$49.99



HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram 512 SSD Quadro K420 Linux GA picture

HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram 512 SSD Quadro K420 Linux GA

$243.59



Dell Precision 5810 Tower Intel Xeon E5-1603v3 2.8GHz 8GB RAM 500GB HDD W10P GPU picture

Dell Precision 5810 Tower Intel Xeon E5-1603v3 2.8GHz 8GB RAM 500GB HDD W10P GPU

$129.99



Discussions

No Discussions have been posted on this vulnerability.