Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:050: kernel


Vulnerability Assessment Details

SUSE-SA:2005:050: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:050 (kernel).


The Linux kernel was updated to fix the following security issues:
- CVE-2005-2457: A problem in decompression of files on 'zisofs'
filesystem was fixed.

- CVE-2005-2458: A potential buffer overflow in the zlib decompression
handling in the kernel was fixed.

- CVE-2005-2459: Some return codes in zlib decoding were fixed which
could have led to a possible hacker crashing the kernel.

- CVE-2005-2555: Only processes with the CAP_NET_ADMIN capability is
now permited load socket policies.

- CVE-2005-2456: Fixed a potential overflow caused by missing boundary
checks of sock->sk_policy in net/xfrm/.

- AMD64/EM64T/x86_64 only: A previous fix for a denial of service
attack with compat 32bit mode programs was too strict and could
crash the kernel. (The earlier fix had the Mitre CVE ID CVE-2005-1765.)

- S/390 only: Fixed /sys/ permissions where a user could change machine
states, including powering down or up partitions.

- CVE-2005-0916: PowerPC only: A missing patch for a hugetlb memory
context handling problem was added.

Above problems affect SUSE Linux 9.1 up to 9.3 and SUSE Linux
Enterprise Server 9.



Solution : http://www.suse.de/security/advisories/2005_50_kernel.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors


Lenovo ThinkPad T14s Gen 1, Core i5 10310U, 16 GB, 256 GB SSD, Windows 11, picture

Lenovo ThinkPad T14s Gen 1, Core i5 10310U, 16 GB, 256 GB SSD, Windows 11,

$219.99



~OVERSTOCK~ 15.6 Lenovo ThinkPad Laptop: Intel i5 16GB RAM 1TB SSD Windows 10 picture

~OVERSTOCK~ 15.6 Lenovo ThinkPad Laptop: Intel i5 16GB RAM 1TB SSD Windows 10

$249.95



Lenovo Yoga 6th Gen ThinkPad 11e 2-in-1 Laptop Windows 10 Pro. 8GB RAM 128GB SSD picture

Lenovo Yoga 6th Gen ThinkPad 11e 2-in-1 Laptop Windows 10 Pro. 8GB RAM 128GB SSD

$139.00



Lenovo  IdeaPad 5 Laptop, 15.6

Lenovo IdeaPad 5 Laptop, 15.6" FHD IPS, Ryzen 7 5825U, 16GB, 512GB SSD

$271.99



Lenovo ThinkBook 15 Gen 4 Notebook 15.6

Lenovo ThinkBook 15 Gen 4 Notebook 15.6" FHD AMD R7 5825U 16GB RAM 512GB SSD

$449.99



Lenovo LOQ 15.6

Lenovo LOQ 15.6" FHD 144Hz Gaming Laptop i5-12450HX 12GB RAM 512GB SSD RTX 3050

$599.99



Lenovo Flex 5 14  FHD Touchscreen 2-in-1 Laptop Ryzen 5-5500U 16GB RAM 512GB SSD picture

Lenovo Flex 5 14 FHD Touchscreen 2-in-1 Laptop Ryzen 5-5500U 16GB RAM 512GB SSD

$449.99



Lenovo - Flex 5i 14

Lenovo - Flex 5i 14" FHD Touchscreen 2-in-1 Laptop - Intel Core i3-1215U with...

$279.99



Lenovo IdeaPad 1i 14

Lenovo IdeaPad 1i 14" (256GB Storage, Intel i3 12th Gen, 8GB RAM) (82QC004BUS)

$209.99



Lenovo ThinkPad 11.6

Lenovo ThinkPad 11.6" Laptop Computer Core i3 8GB RAM 256GB SSD WiFi Windows 10

$126.09



Discussions

No Discussions have been posted on this vulnerability.