|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN47-1 : linux-source-2.6.8.1 vulnerabilities Vulnerability Assessment Details
|
USN47-1 : linux-source-2.6.8.1 vulnerabilities |
||
linux-source-2.6.8.1 vulnerabilities Detailed Explanation for this Vulnerability Assessment Summary : These remote packages are missing security patches : - linux-doc-2.6.8.1 - linux-headers-2.6.8.1-4 - linux-headers-2.6.8.1-4-386 - linux-headers-2.6.8.1-4-686 - linux-headers-2.6.8.1-4-686-smp - linux-headers-2.6.8.1-4-amd64-generic - linux-headers-2.6.8.1-4-amd64-k8 - linux-headers-2.6.8.1-4-amd64-k8-smp - linux-headers-2.6.8.1-4-amd64-xeon - linux-headers-2.6.8.1-4-k7 - linux-headers-2.6.8.1-4-k7-smp - linux-headers-2.6.8.1-4-power3 - linux-headers-2.6.8.1-4-power3-smp - linux-headers-2.6.8. [...] Description : Georgi Guninski discovered two Denial of Service vulnerabilities in the Linux kernel. An integer overflow in the vc_resize() function caused the memory allocation for the new screen being too short, thus causing a buffer overflow and a kernel crash. There was also a memory leak in the ip_options_get() function. Calling ip_cmsg_send() very often would gradually exhaust memory. Note: The original advisory (see URL above) also mentions a "ip_options_get integer overflow". This was already fixed in USN-38-1 (known as CVE-2004-1016). Solution : Upgrade to : - linux-doc-2.6.8.1-2.6.8.1-16.5 (Ubuntu 4.10) - linux-headers-2.6.8.1-4-2.6.8.1-16.5 (Ubuntu 4.10) - linux-headers-2.6.8.1-4-386-2.6.8.1-16.5 (Ubuntu 4.10) - linux-headers-2.6.8.1-4-686-2.6.8.1-16.5 (Ubuntu 4.10) - linux-headers-2.6.8.1-4-686-smp-2.6.8.1-16.5 (Ubuntu 4.10) - linux-headers-2.6.8.1-4-amd64-generic-2.6.8.1-16.5 (Ubuntu 4.10) - linux-headers-2.6.8.1-4-amd64-k8-2.6.8.1-16.5 (Ubuntu 4.10) - linux-headers-2.6.8.1-4-amd64-k8-smp-2.6.8.1-16.5 (Ubuntu 4.10) - linux-headers-2.6.8.1-4-a [...] Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi |
||
Cables, Connectors |
Vintage 5362 IBM System/36 Mini-Computer Mainframe 5291 2, CRT Terminal DM12N501
$349.99
IBM Type 4869 External 5 1/4in Floppy Disk Drive Mainframe Collection - UNTESTED
$75.00
Vintage Hewlett Packard HP 2100S Microprogrammable Computer System Mainframe #2
$1499.99
Rare Vintage Texas Instruments Silent 700 Data Terminal + phone hookup
$145.00
NOS Vintage CRAY X-MP SCALE MODEL Supercomputer Black Brown
$347.60
National Semiconductor SC/MP Low Cost Development System w/ Cards Manuals
$975.00
$150.00
Vintage Apple Mac Macintosh 512K Case & Working CRT Only Chasis Mainframe
$99.99
Sage MAS 90 Software for Windows Financial Reporting Mainframe Collection
$360.99
Vintage IBM Mainframe Push Buttons And Connectors For Collection Gold...
$400.00
|
||
No Discussions have been posted on this vulnerability. |