Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
linux-source-2.6.10, linux-source-184.108.40.206 vulnerabilities
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
A Denial of Service vulnerability was discovered in the
sys_set_mempolicy() function. By calling the function with a negative
first argument, a local attacker could cause a kernel crash.
A race condition was discovered in the handling of shared memory
mappings with CLONE_VM. A local attacker could exploit this to cause a
deadlock (Denial of Service) by triggering a core dump while waiting
for a thread which had just performed an exec() system call.
A race condition was found in the handling of traced processes. When
one thread was tracing another thread that shared the same memory map,
a local attacker could trigger a deadlock (Denial of Service) by
forcing a core dump when the traced thread was in the TASK_TRACED
A vulnerability has been found in the "ioremap" module. By performing
certain IO mapping operations, a local attacker could either read
memory pages he has not normally access to (information leak) or cause
a kernel crash (Denial of Servic
Upgrade to :
- linux-doc-2.6.10-2.6.10-34.7 (Ubuntu 5.04)
- linux-doc-220.127.116.11-18.104.22.168-16.24 (Ubuntu 4.10)
- linux-headers-2.6.10-5-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-386-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-686-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-686-smp-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-generic-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-k8-2.6.10-34.7 (Ubuntu 5.04)
- linux-headers-2.6.10-5-amd64-k8-smp-2.6.10-34.7 (Ubuntu 5
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|Protable 4TB Pocket External Enclosure Case Hard Drive HDD HD USB 3.0 2.5''
|New Seagate HDD ST10000NM0096 10TB 3.5 inch 7200RPM 256MB 12GB/s Enterprise Bare
|New Seagate HDD ST10000NM0086 10TB 3.5 inch 7200RPM 256MB SATA 6Gb/s Enterprise
|USB 3.0 to 2.5"/3.5" IDE SATA Hard Drive Adapter HDD Transfer Converter Cable
No Discussions have been posted on this vulnerability.