Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SuSE-SA:2003:049: Linux Kernel


Vulnerability Assessment Details

SuSE-SA:2003:049: Linux Kernel

Vulnerability Assessment Summary
Check for the version of the Linux Kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SuSE-SA:2003:049 (Linux Kernel).


This security update fixes a serious vulnerability in the Linux
kernel. A missing bounds check in the brk() system call permited
processes to request memory beyond the maximum size permited for tasks,
causing kernel memory to be mapped into the process' address space.
This permited local attackers to obtain super user rights.

An exploit for this vulnerability is circulating in the wild, and
has been used to compromise OpenSource development servers.

There is no temporary workaround for this bug.

This update also fixes several other security issues in the
kernel

- race condition with files opened via O_DIRECT which could
be exploited to read disk blocks randomly. This could include
blocks of previously deleted files with sensitive content.
- don't permit users to send signals to kmod
- when reading the RTC, don't leak kernel stack data to user space



Solution : http://www.suse.de/security/2003_049_kernel.html
Network Security Threat Level: High

Networks Security ID: 9138

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors


Intel Core i7-6700 Processor (3.40 GHz, 4 Cores, LGA 1151) - SR2L2 picture

Intel Core i7-6700 Processor (3.40 GHz, 4 Cores, LGA 1151) - SR2L2

$49.00



Intel Core i7-6700 3.40ghz LGA1151 SR2L2 Processor picture

Intel Core i7-6700 3.40ghz LGA1151 SR2L2 Processor

$49.99



Intel Core i5-9600k SRELU 3.70GHz LGA 1151 CPU Processor picture

Intel Core i5-9600k SRELU 3.70GHz LGA 1151 CPU Processor

$55.00



Intel Core i5-13400F Desktop Processor - 10 Cores (6P+4E) & 16 Threads picture

Intel Core i5-13400F Desktop Processor - 10 Cores (6P+4E) & 16 Threads

$109.99



(New) AMD Ryzen 5 8400F 6-Core 12-Thread Socket AM5 CPU Processor OEM Tray picture

(New) AMD Ryzen 5 8400F 6-Core 12-Thread Socket AM5 CPU Processor OEM Tray

$109.99



Intel Core i5-7500T 2.70GHz Quad Core 6Mb LGA1151 Processor SR337 | tested picture

Intel Core i5-7500T 2.70GHz Quad Core 6Mb LGA1151 Processor SR337 | tested

$23.99



(New) AMD Ryzen 5 5600 Vermeer Zen3 6-Core 12-Thread AM4 CPU Processor OEM Tray picture

(New) AMD Ryzen 5 5600 Vermeer Zen3 6-Core 12-Thread AM4 CPU Processor OEM Tray

$94.99



Intel Core i7-4790 SR1QF 3.60GHz Quad Core LGA1150 8MB Processor CPU Tested picture

Intel Core i7-4790 SR1QF 3.60GHz Quad Core LGA1150 8MB Processor CPU Tested

$27.95



Transmeta Processor TMTA301423 Vintage NEW  picture

Transmeta Processor TMTA301423 Vintage NEW

$39.85



Intel Xeon E5-2667V4 SR2P5 (3.2GHZ/8-CORE/25MB/135W) PROCESSOR CPU picture

Intel Xeon E5-2667V4 SR2P5 (3.2GHZ/8-CORE/25MB/135W) PROCESSOR CPU

$19.95



Discussions

No Discussions have been posted on this vulnerability.