Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:068: kernel


Vulnerability Assessment Details

SUSE-SA:2005:068: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:068 (kernel).


The Linux kernel was updated to fix several security problems and
several bugs, listed below:

Security fixes:
- CVE-2005-3783: A check in ptrace(2) handling that finds out if
a process is attaching to itself was incorrect and could be used
by a local attacker to crash the machine. (All)

- CVE-2005-3784: A check in reaping of terminating child processes did
not consider ptrace(2) attached processes and would leave a ptrace
reference dangling. This could lead to a local user being able to
crash the machine. (Linux kernel 2.6 based products only)

- CVE-2005-3806: A bug in IPv6 flow label handling code could be used
by a local attacker to free non-allocated memory and in turn corrupt
kernel memory and likely crash the machine. (All)

- CVE-2005-3805: A locking problem in POSIX timer handling could
be used by a local attacker on a SMP system to deadlock the
machine. (SUSE Linux 9.3)

- CVE-2005-3527: A race condition in do_coredump in signal.c permits
local users to cause a denial of service (machine hang) by
triggering a core dump in one thread while another thread has a
pending SIGSTOP. (SUSE Linux 9.3)

- CVE-2005-3807: A memory kernel leak in VFS lease handling can exhaust
the machine memory and so cause a local denial of service. This
is seen in regular Samba use and could also be triggered by local
attackers. (SUSE Linux 9.3)

- Others: see original advisory

Solution : http://www.suse.de/security/advisories/2005_68_kernel.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors


4TB 7200RPM 64MB SATA 6Gb/s 512e 3.5

4TB 7200RPM 64MB SATA 6Gb/s 512e 3.5" HGST Ultrastar Hard Drive HUS724040ALA640

$30.00



Seagate ST6000NM0044 6TB 128MB Cache 7200RPM SATA 6Gb/s 3.5

Seagate ST6000NM0044 6TB 128MB Cache 7200RPM SATA 6Gb/s 3.5" Internal Hard Drive

$69.99



WD Ultrastar DC HC320 HUS728T8TALE6L4 8TB 7200RPM SATA 6Gb/s 3.5

WD Ultrastar DC HC320 HUS728T8TALE6L4 8TB 7200RPM SATA 6Gb/s 3.5" Enterprise HDD

$95.00



Seagate Exos 7E8 8TB 7200RPM SATA 6.0GB/s 256MB 3.5

Seagate Exos 7E8 8TB 7200RPM SATA 6.0GB/s 256MB 3.5" Hard Drive - ST8000NM000A

$118.88



HUS726060ALA640 HGST ULTRASTAR 6TB 7.2K 6G LFF 3.5

HUS726060ALA640 HGST ULTRASTAR 6TB 7.2K 6G LFF 3.5" SATA ENTERPRISE HARD DRIVE

$41.35



Seagate Constellation ES ST4000NM0033 4TB 7200RPM 128MB 6.0Gb/s 3.5

Seagate Constellation ES ST4000NM0033 4TB 7200RPM 128MB 6.0Gb/s 3.5" Hard Drive

$53.88



Seagate 16TB Exos X16 SATA 6Gb/s 7200RPM 3.5

Seagate 16TB Exos X16 SATA 6Gb/s 7200RPM 3.5" Enterprise HDD — ST16000NM001G

$179.99



WD My Passport 4TB Certified Refurbished Portable Hard Drive Orange picture

WD My Passport 4TB Certified Refurbished Portable Hard Drive Orange

$59.99



Western Digital WD5000AAKX 500GB 7200RPM 6Gb/s 3.5in SATA Hard Drive picture

Western Digital WD5000AAKX 500GB 7200RPM 6Gb/s 3.5in SATA Hard Drive

$22.95



HYBRID SSD  HDD Seagate FireCuda 500GB ST500LX025  SATA 2.5

HYBRID SSD HDD Seagate FireCuda 500GB ST500LX025 SATA 2.5" SSHD Dell 87X04

$10.40



Discussions

No Discussions have been posted on this vulnerability.