Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:003: kernel


Vulnerability Assessment Details

SUSE-SA:2005:003: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:003 (kernel).



Several exploitable security problems were identified and fixed in
the Linux kernel, the core of every SUSE Linux product.


- Due to missing locking in the sys_uselib system call a local attacker
can gain root access. This was found by Paul Starzetz and is tracked
by the Mitre CVE ID CVE-2004-1235.


- Paul Starzetz also found a race condition in SMP page table handling
which could lead to a local attacker gaining root access on SMP
machines. This is tracked by the Mitre CVE ID CVE-2005-0001.


- A local denial of service was found in the auditing subsystem which
have lead a local attacker crashing the machine. This was reported
and fixed by Redhat.


- The sendmsg / cmsg fix from the previous kernel update was faulty
on 64bit systems with 32bit compatibility layer and could lead to
32bit applications not working correctly on those 64bit systems.


- The smbfs security fixes from a before-previous kernel update were
faulty for some file write cases.


- A local denial of service with Direct I/O access to NFS file systems
could lead a local attacker to crash a machine with NFS mounts.


- grsecurity reported a signed integer problem in the SCSI ioctl
handling which had a missing boundary check.
Due to C language specifics, this evaluation was not correct and
there actually is no problem in this code.
The signed / unsigned mismatch was fixed nevertheless.


- Several more small non security problems were fixed.


NOTE: Two days ago we released the Service Pack 1 for the SUSE Linux
Enterprise Server 9. This kernel update contains fixes for the SUSE
Linux Enterprise Server 9 GA version kernel line.

A fix for the Service Pack 1 version line will be available shortly.



Solution : http://www.suse.de/security/advisories/2005_03_kernel.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Crucial 8GB kit 4X 2GB 2RX8 PC2-5300S DDR2 667Mhz SODIMM RAM Laptop Memory 5300
$16.99
Crucial 8GB kit 4X 2GB 2RX8 PC2-5300S DDR2 667Mhz SODIMM RAM Laptop Memory 5300 pictureAneew Metal Pendrive 32GB U Disk Dog Tag Necklace USB Flash Drive Memory
$17.82
Aneew Metal Pendrive 32GB U Disk Dog Tag Necklace USB Flash Drive Memory pictureAneew 32GB Cartoon Sloth Animal USB Flash Drive Memory Thumb Stick Pendrive U
$16.54
Aneew 32GB Cartoon Sloth Animal USB Flash Drive Memory Thumb Stick Pendrive U pictureKOOTION 10PCS 16GB USB2.0 Flash Drive Memory Stick Flash Drive -10 Pack- 5 Blue,
$64.96
KOOTION 10PCS 16GB USB2.0 Flash Drive Memory Stick Flash Drive -10 Pack- 5 Blue, picture


Discussions

No Discussions have been posted on this vulnerability.