|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN82-1 : linux-source-2.6.8.1 vulnerabilities Vulnerability Assessment Details
|
USN82-1 : linux-source-2.6.8.1 vulnerabilities |
||
linux-source-2.6.8.1 vulnerabilities Detailed Explanation for this Vulnerability Assessment Summary : These remote packages are missing security patches : - linux-doc-2.6.8.1 - linux-headers-2.6.8.1-5 - linux-headers-2.6.8.1-5-386 - linux-headers-2.6.8.1-5-686 - linux-headers-2.6.8.1-5-686-smp - linux-headers-2.6.8.1-5-amd64-generic - linux-headers-2.6.8.1-5-amd64-k8 - linux-headers-2.6.8.1-5-amd64-k8-smp - linux-headers-2.6.8.1-5-amd64-xeon - linux-headers-2.6.8.1-5-k7 - linux-headers-2.6.8.1-5-k7-smp - linux-headers-2.6.8.1-5-power3 - linux-headers-2.6.8.1-5-power3-smp - linux-headers-2.6.8. [...] Description : CVE-2004-0176: Michael Kerrisk noticed an insufficient permission checking in the shmctl() function. Any process was permitted to lock/unlock any System V shared memory segment that fell within the the RLIMIT_MEMLOCK limit (that is the maximum size of shared memory that unprivileged users can acquire). This permited am unprivileged user process to unlock locked memory of other processes, thereby permiting them to be swapped out. Usually locked shared memory is used to store passphrases and other sensitive content which must not be written to the swap space (where it could be read out even after a reboot). CVE-2005-0177: OGAWA Hirofumi noticed that the table sizes in nls_ascii.c were incorrectly set to 128 instead of 256. This caused a buffer overflow in some cases which could be exploited to crash the kernel. CVE-2005-0178: A race condition was found in the terminal handling of the "setsid()" function, which is used to start new process sessions. http://oss.sgi.com/archives [...] Solution : Upgrade to : - linux-doc-2.6.8.1-2.6.8.1-16.11 (Ubuntu 4.10) - linux-headers-2.6.8.1-5-2.6.8.1-16.11 (Ubuntu 4.10) - linux-headers-2.6.8.1-5-386-2.6.8.1-16.11 (Ubuntu 4.10) - linux-headers-2.6.8.1-5-686-2.6.8.1-16.11 (Ubuntu 4.10) - linux-headers-2.6.8.1-5-686-smp-2.6.8.1-16.11 (Ubuntu 4.10) - linux-headers-2.6.8.1-5-amd64-generic-2.6.8.1-16.11 (Ubuntu 4.10) - linux-headers-2.6.8.1-5-amd64-k8-2.6.8.1-16.11 (Ubuntu 4.10) - linux-headers-2.6.8.1-5-amd64-k8-smp-2.6.8.1-16.11 (Ubuntu 4.10) - linux-headers-2.6 [...] Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi |
||
Cables, Connectors |
HPE BL460c G10 ProLiant Blade | 2x Silver 4110 | 16GB | P204I | 2x300GB 10KRPM
$1419.00
Dell PowerEdge FX2 FX2S Enclosure - 4x PowerEdge FC640 w/ 8x Gold 6132 112C 1TB
$2699.99
Dell PowerEdge FX2 FX2S Enclosure - 4x PowerEdge FC640 w/ 8x Gold 6134 64C 1TB
$3299.99
Dell PowerEdge M620 0F9HJC Blade Server 2*E5-2670 2.60GHz 192GB RAM 2*300GB SAS
$103.99
Dell PowerEdge M640 Blade Server 2x Xeon Gold 5122 3.6GHz, No RAM, READ _
$402.38
HP ProLiant BL460c G9 (Gen9) 2x E5-2670V3 12 Core 3.1GHz No Ram or No Drives
$59.98
HPE 863442-B21 ProLiant BL460c G10 Blade (2) Intel Xeon Silver CPUs NO HD/NO RAM
$319.00
HPE ProLiant BL460c Gen9 16-Core Blade 779803-S01 (2)CPU on board No RAM/No HDD
$89.00
Cisco UCS 5108 Blade Server Chassis Enclosure N20-C6508 4x PSU 8x Fans 2x Fabric
$139.99
Dell PowerEdge FX2s CTO Blade 4 Slot 2U Chassis 2x 2000W
$399.00
|
||
No Discussions have been posted on this vulnerability. |