Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55274
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-178-1 (linux-source-2.6.8.1)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to linux-source-2.6.8.1
announced via advisory USN-178-1.

A security issue affects the kernel packages in the 4.10 and
5.04 Ubuntu releases. For a detailed list, please visit the
referenced security advisory.

Oleg Nesterov discovered a local Denial of Service vulnerability in
the timer handling. When a non group-leader thread called exec() to
execute a different program while an itimer was pending, the timer
expiry would signal the old group leader task, which did not exist any
more. This caused a kernel panic. This vulnerability only affects
Ubuntu 5.04. (CVE-2005-1913)

Al Viro discovered that the sendmsg() function did not sufficiently
validate its input data. By calling sendmsg() and at the same time
modifying the passed message in another thread, he could exploit this
to execute arbitrary commands with kernel privileges. This only
affects the amd64 bit platform. (CVE-2005-2490)

Al Viro discovered a vulnerability in the raw_sendmsg() function. By
calling this function with specially crafted arguments, a local
attacker could either read kernel memory contents (leading to
information disclosure) or manipulate the hardware state by reading
certain IO ports. This vulnerability only affects Ubuntu 5.04.
(CVE-2005-2492)

Jan Blunck discovered a Denial of Service vulnerability in the procfs
interface of the SCSI driver. By repeatedly reading
/proc/scsi/sg/devices, a local attacker could eventually exhaust
kernel memory. (CVE-2005-2800)

A flaw was discovered in the handling of extended attributes on ext2
and ext3 file systems. Under certain condidions, this could prevent
the enforcement of Access Control Lists, which eventually could lead
to information disclosure, unauthorized program execution, or
unauthorized data modification. This does not affect the standard Unix
permissions. (CVE-2005-2801)

Chad Walstrom discovered a Denial of Service in the ipt_recent module,
which can be used in netfilter (Firewall configuration). A remote
attacker could exploit this to crash the kernel by sending certain
packets (such as an SSH brute force attack) to a host which uses the
recent module. (CVE-2005-2802)

Solution:
The problem can be corrected by upgrading the affected package to
version 2.6.8.1-16.22 (for Ubuntu 4.10), or 2.6.10-34.5 (for Ubuntu
5.04). After a standard system upgrade you need to reboot your
computer to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-178-1

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-1913
BugTraq ID: 14054
http://www.securityfocus.com/bid/14054
http://secunia.com/advisories/15786/
http://www.ubuntu.com/usn/usn-178-1
XForce ISS Database: kernel-subthread-dos(21138)
https://exchange.xforce.ibmcloud.com/vulnerabilities/21138
Common Vulnerability Exposure (CVE) ID: CVE-2005-2490
14785
http://www.securityfocus.com/bid/14785
16747
http://secunia.com/advisories/16747/
17002
http://secunia.com/advisories/17002
17073
http://secunia.com/advisories/17073
17826
http://secunia.com/advisories/17826
17918
http://secunia.com/advisories/17918
19374
http://secunia.com/advisories/19374
2005-0049
http://marc.info/?l=bugtraq&m=112690609622266&w=2
ADV-2005-1878
http://www.vupen.com/english/advisories/2005/1878
DSA-1017
http://www.debian.org/security/2006/dsa-1017
FLSA:157459-1
http://www.securityfocus.com/archive/1/428028/100/0/threaded
FLSA:157459-2
http://www.securityfocus.com/archive/1/428058/100/0/threaded
FLSA:157459-3
http://www.securityfocus.com/archive/1/427980/100/0/threaded
MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
MDKSA-2005:235
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
RHSA-2005:514
http://www.redhat.com/support/errata/RHSA-2005-514.html
RHSA-2005:663
http://www.redhat.com/support/errata/RHSA-2005-663.html
SUSE-SA:2005:068
http://www.securityfocus.com/archive/1/419522/100/0/threaded
USN-178-1
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248
kernel-sendmsg-bo(22217)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22217
oval:org.mitre.oval:def:10481
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10481
Common Vulnerability Exposure (CVE) ID: CVE-2005-2492
14787
http://www.securityfocus.com/bid/14787
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166830
kernel-rawsendmsg-obtain-information(22218)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22218
oval:org.mitre.oval:def:11031
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11031
Common Vulnerability Exposure (CVE) ID: CVE-2005-2800
BugTraq ID: 14790
http://www.securityfocus.com/bid/14790
Debian Security Information: DSA-1017 (Google Search)
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9954
http://www.redhat.com/support/errata/RHSA-2006-0101.html
http://secunia.com/advisories/18510
SuSE Security Announcement: SUSE-SA:2005:068 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2005-2801
BugTraq ID: 14793
http://www.securityfocus.com/bid/14793
Debian Security Information: DSA-921 (Google Search)
http://www.debian.org/security/2005/dsa-921
Debian Security Information: DSA-922 (Google Search)
http://www.debian.org/security/2005/dsa-922
http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html
http://lists.debian.org/debian-kernel/2005/08/msg00238.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495
http://www.redhat.com/support/errata/RHSA-2006-0144.html
http://secunia.com/advisories/18056
http://secunia.com/advisories/18059
http://secunia.com/advisories/19252
SuSE Security Announcement: SUSE-SA:2005:018 (Google Search)
http://www.novell.com/linux/security/advisories/2005_18_kernel.html
Common Vulnerability Exposure (CVE) ID: CVE-2005-2802
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.