Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:235: kernel


Vulnerability Assessment Details

MDKSA-2005:235: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:235 (kernel).



Multiple vulnerabilities in the Linux 2.6 kernel have been discovered and
corrected in this update: A stack-based buffer overflow in the sendmsg function
call in versions prior to 2.6.13.1 permit local users to execute arbitrary code
by calling sendmsg and modifying the message contents in another thread
(CVE-2005-2490). The raw_sendmsg function in versions prior to 2.6.13.1 permit
local users to cause a DoS (change hardware state) or read from arbitrary
memory via crafted input (CVE-2005-2492). The ipt_recent module in versions
prior to 2.6.12 does not properly perform certain tests when the jiffies value
is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block
too early (CVE-2005-2873). Multiple vulnerabilities in versions prior to
2.6.13.2 permit local users to cause a DoS (oops from null dereference) via fput
in a 32bit ioctl on 64-bit x86 systems or sockfd_put in the 32-bit
routing_ioctl function on 64-bit systems (CVE-2005-3044). Versions 2.6.8 to
2.6.14-rc2 permit local users to cause a DoS (oops) via a userspace process that
issues a USB Request Block (URB) to a USB device and terminates before the URB
is finished, which leads to a stale pointer reference (CVE-2005-3055). drm.c in
version 2.6.13 and earlier creates a debug file in sysfs with world-readable
and world-writable permissions, permiting local users to enable DRM debugging
and obtain sensitive information (CVE-2005-3179). The Orinoco driver in 2.6.13
and earlier does not properly clear memory from a previously used packet whose
length is increased, permiting remote attackers to obtain sensitive information
(CVE-2005-3180). Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is
enabled, use an incorrect function to free names_cache memory, preventing the
memory from being tracked by AUDITSYSCALL code and leading to a memory leak
(CVE-2005-3181). The VT implementation in version 2.6.12 permits local users to
use certain IOCTLs on terminals of other users and gain rights
(CVE-2005-3257). A race condition in ip_vs_conn_flush in versions prior to
2.6.13, when running on SMP systems, permits local users to cause a DoS (null
dereference) by causing a connection timer to expire while the connection table
is being flushed before the appropriate lock is acquired (CVE-2005-3274). The
provided packages are patched to fix these vulnerabilities. All users are
encouraged to upgrade to these updated kernels. To update your kernel, please
follow the directions located at: http://www.mandriva.com/en/security/
kernelupdate



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:235
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors


H261-Z61 2U 24SFF AMD Server 8x EPYC 7702 512-Cores 2048GB RAM 8x25G NIC 2x2200W picture

H261-Z61 2U 24SFF AMD Server 8x EPYC 7702 512-Cores 2048GB RAM 8x25G NIC 2x2200W

$13292.18



Dell PowerEdge R7525 Server 24X2.5(8XNVME)+H745 2xEPYC 7302 CPU 128G RAM 2x2400W picture

Dell PowerEdge R7525 Server 24X2.5(8XNVME)+H745 2xEPYC 7302 CPU 128G RAM 2x2400W

$3350.00



Genuine HP ProLiant MicroServer Gen8 Intel Pentium G2020T 2.5GHz 712318-001 picture

Genuine HP ProLiant MicroServer Gen8 Intel Pentium G2020T 2.5GHz 712318-001

$199.95



SuperMicro Server 505-2 Intel Atom 2.4GHz 8GB RAM SYS-5018A-FTN4 1U Rackmount picture

SuperMicro Server 505-2 Intel Atom 2.4GHz 8GB RAM SYS-5018A-FTN4 1U Rackmount

$202.49



SuperMicro SYS-E100-9APP Fanless Server Firewall 4core 8GB RAM 256GB M.2 Mini PC picture

SuperMicro SYS-E100-9APP Fanless Server Firewall 4core 8GB RAM 256GB M.2 Mini PC

$200.00



Open Eye OE-MTX08 8TB Micro Server With Linux (Boots To Login) No Accessories  picture

Open Eye OE-MTX08 8TB Micro Server With Linux (Boots To Login) No Accessories

$294.95



Supermicro E300-8D Xeon D-1518 2.20GHz Mini Server picture

Supermicro E300-8D Xeon D-1518 2.20GHz Mini Server

$549.99



Supermicro Super Server Tower Xeon X7 32GB ram. UIO slot- NO HDD NO OS picture

Supermicro Super Server Tower Xeon X7 32GB ram. UIO slot- NO HDD NO OS

$124.95



1U 20

1U 20" Short Depth Server Firewall PFSense X11SSH-F Xeon 3.5Ghz 32GB RAM NVME

$247.00



1U Supermicro Server 10 Bay 2x Intel Xeon 3.3Ghz 8C 128GB RAM 480GB SSD 2x 10GBE picture

1U Supermicro Server 10 Bay 2x Intel Xeon 3.3Ghz 8C 128GB RAM 480GB SSD 2x 10GBE

$297.00



Discussions

No Discussions have been posted on this vulnerability.