Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2006:018: kernel


Vulnerability Assessment Details

MDKSA-2006:018: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2006:018 (kernel).



A number of vulnerabilites have been corrected in the Linux kernel: A race
condition in the 2.6 kernel could permit a local user to cause a DoS by
triggering a core dump in one thread while another thread has a pending SIGSTOP
(CVE-2005-3527). The ptrace functionality in 2.6 kernels prior to 2.6.14.2,
using CLONE_THREAD, does not use the thread group ID to check whether it is
attaching to itself, which could permit local users to cause a DoS
(CVE-2005-3783). The auto-reap child process in 2.6 kernels prior to 2.6.15
include processes with ptrace attached, which leads to a dangling ptrace
reference and permits local users to cause a crash (CVE-2005-3784). A locking
problem in the POSIX timer cleanup handling on exit on kernels 2.6.10 to 2.6.14
when running on SMP systems, permits a local user to cause a deadlock involving
process CPU timers (CVE-2005-3805). The IPv6 flowlabel handling code in 2.4 and
2.6 kernels prior to 2.4.32 and 2.6.14 modifes the wrong variable in certain
circumstances, which permits local users to corrupt kernel memory or cause a
crash by triggering a free of non-allocated memory (CVE-2005-3806). An integer
overflow in 2.6.14 and earlier could permit a local user to cause a hang via
64-bit mmap calls that are not properly handled on a 32-bit system
(CVE-2005-3808). As well, other bugfixes are included in this update: Fixes to
swsup and HDA sound fixes (DMA buffer fixes, and fixes for the AD1986a codec,
added support for Nvidia chipsets, and new model information for the Gigabyte
K8N51). MCP51 forcedeth support has been added.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:018
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Dell PowerEdge R710 Server Dual Xeon L5520 QC 2.26GHz 256GB 6/i 2x 146GB, 4x 1TB
$1358.0
Dell PowerEdge R710 Server Dual Xeon L5520 QC 2.26GHz 256GB 6/i 2x 146GB, 4x 1TB pictureDell R520 Dual E5-2450L 8 Core 1.8GHz 192GB 8x 1TB SAS H710 iDRAC ENT RPS
$2404.0
Dell R520 Dual E5-2450L 8 Core 1.8GHz 192GB 8x 1TB SAS H710 iDRAC ENT RPS pictureApple 2013 Mac Pro 2.7GHz 12-Core Xeon E5 1TB SSD 48GB MD878LL/A-BTO + AppleCare
$3399.0
Apple 2013 Mac Pro 2.7GHz 12-Core Xeon E5 1TB SSD 48GB MD878LL/A-BTO + AppleCare pictureApple Mac Mini (Late 2014 - MGEQ2LL/A) - i5 2.8GHz - 8GB RAM - 1TB Fusion Drive
$750.0
Apple Mac Mini (Late 2014 - MGEQ2LL/A) - i5 2.8GHz - 8GB RAM - 1TB Fusion Drive picture


Discussions

No Discussions have been posted on this vulnerability.