Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.50892
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2001:082 (kernel22)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to kernel22
announced via advisory MDKSA-2001:082.

Rafal Wojtczuk found a vulnerability in the 2.2.19 and 2.4.11 Linux
kernels with the ptrace code and deeply nested symlinks spending an
arbitrary amount of time in the kernel code. The ptrace vulnerability
could be used by local users to gain root privilege, the symlink
vulnerability could result in a local DoS.

NOTE: This update is *not* meant to be done via MandrakeUpdate! You
must download the necessary RPMs and upgrade manually by following
these steps:

1. Type: rpm -ivh kernel-[version].i586.rpm
2. Type: mv kernel-[version].i586.rpm /tmp
3. Type: rpm -Fvh *.rpm
4a. You may wish to edit /etc/lilo.conf to ensure a new entry is in
place. The new kernel will be the last entry. Change any options
you need to change. You will also want to create a new entry with
the initrd and image directives pointing to the old kernel's
vmlinuz and initrd images so you may also boot from the old
images if required.
4b. PPC users must execute some additional instructions. First edit
/etc/yaboot.conf and add a new entry for the kernel and change
any options that you need to change. You must also create a new
initrd image to enable USB support for keyboards and mice by
typing:
mkinitrd --with=usb-ohci /boot/initrd-2.2.19-19.1mdk 2.2.19-19.1mdk
5a. Type: /sbin/lilo -v
5b. PPC users must type: /sbin/ybin -v

You may then reboot and use the new kernel and remove the older kernel
when you are comfortable using the upgraded one.

Affected versions: 7.1, 7.2, 8.0, 8.1, Corporate Server 1.0.1,
Single Network Firewall 7.2


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2001:082
http://www.securityfocus.com/cgi-bin/archive.pl?id=1&mid=221337
http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.