|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN178-1 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities Vulnerability Assessment Details
|
USN178-1 : linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities |
||
linux-source-2.6.10, linux-source-2.6.8.1 vulnerabilities Detailed Explanation for this Vulnerability Assessment Summary : These remote packages are missing security patches : - linux-doc-2.6.10 - linux-doc-2.6.8.1 - linux-headers-2.6.10-5 - linux-headers-2.6.10-5-386 - linux-headers-2.6.10-5-686 - linux-headers-2.6.10-5-686-smp - linux-headers-2.6.10-5-amd64-generic - linux-headers-2.6.10-5-amd64-k8 - linux-headers-2.6.10-5-amd64-k8-smp - linux-headers-2.6.10-5-amd64-xeon - linux-headers-2.6.10-5-itanium - linux-headers-2.6.10-5-itanium-smp - linux-headers-2.6.10-5-k7 - linux-headers-2.6.10-5-k7-smp - linux-head [...] Description : Oleg Nesterov discovered a local Denial of Service vulnerability in the timer handling. When a non group-leader thread called exec() to execute a different program while an itimer was pending, the timer expiry would signal the old group leader task, which did not exist any more. This caused a kernel panic. This vulnerability only affects Ubuntu 5.04. (CVE-2005-1913) Al Viro discovered that the sendmsg() function did not sufficiently validate its input data. By calling sendmsg() and at the same time modifying the passed message in another thread, he could exploit this to execute arbitrary commands with kernel rights. This only affects the amd64 bit platform. (CVE-2005-2490) Al Viro discovered a vulnerability in the raw_sendmsg() function. By calling this function with specially crafted arguments, a local attacker could either read kernel memory contents (leading to information disclosure) or manipulate the hardware state by reading certain IO ports. This vulnerability only affects Ubuntu 5.04. (CAN-200 [...] Solution : Upgrade to : - linux-doc-2.6.10-2.6.10-34.5 (Ubuntu 5.04) - linux-doc-2.6.8.1-2.6.8.1-16.22 (Ubuntu 4.10) - linux-headers-2.6.10-5-2.6.10-34.5 (Ubuntu 5.04) - linux-headers-2.6.10-5-386-2.6.10-34.5 (Ubuntu 5.04) - linux-headers-2.6.10-5-686-2.6.10-34.5 (Ubuntu 5.04) - linux-headers-2.6.10-5-686-smp-2.6.10-34.5 (Ubuntu 5.04) - linux-headers-2.6.10-5-amd64-generic-2.6.10-34.5 (Ubuntu 5.04) - linux-headers-2.6.10-5-amd64-k8-2.6.10-34.5 (Ubuntu 5.04) - linux-headers-2.6.10-5-amd64-k8-smp-2.6.10-34.5 (Ubuntu 5 [...] Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi |
||
Cables, Connectors |
Dell Optiplex 5060 SFF 8th Gen Core i7 3.2GHZ 16GB 512GB Win 11 Pro
$249.00
Lenovo IdeaCentre 3 07IRB8 Desktop Intel Core i5-13400 16GB 512GB SSD W11H
$429.99
Intel - Core i9-13900K 13th Gen 24 cores 8 P-cores + 16 E-cores 36M Cache, 3 ...
$689.99
Intel - Core i7-13700K 13th Gen 16 cores 8 P-cores + 8 E-cores 30M Cache, 3.4...
$489.99
Dell OptiPlex 7060 Micro 8-Core i7 8700 3.20GHz 16GB 512GB SSD Win 11 Pro
$214.00
AMD Ryzen 7 7800X3D 8-Core - 16-Thread 4.2 GHz (5.0 GHz Max Boost) Socket A...
$339.95
Apple Mac Pro Processor Tray 5,1 2010 2012 2.4ghz 8 core
$79.99
Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc...
$619.99
Dell 9020 Optiplex Micro-Intel Core i5 - 1TB SSD 8GB RAM Window 11
$129.49
Lenovo IP 5 16IAU7 16" 2.5K Chromebook i3-1215U 8GB Ram 128GB eMMC Chrome OS
$199.99
|
||
No Discussions have been posted on this vulnerability. |