Description: | Description: The remote host is missing an update to linux-image-2.6.35-31-generic announced via advisory USN-1272-1.
Details:
It was discovered that CIFS incorrectly handled authentication. When a user had a CIFS share mounted that required authentication, a local user could mount the same share without knowing the correct password. (CVE-2011-1585)
Andrea Righi discovered a race condition in the KSM memory merging support. If KSM was being used, a local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2183)
Vasily Averin discovered that the NFS Lock Manager (NLM) incorrectly handled unlock requests. A local attacker could exploit this to cause a denial of service. (CVE-2011-2491)
Robert Swiecki discovered that mapping extensions were incorrectly handled. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2496)
It was discovered that the wireless stack incorrectly verified SSID lengths. A local attacker could exploit this to cause a denial of service or gain root privileges. (CVE-2011-2517)
Solution: The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.10: linux-image-2.6.35-31-generic 2.6.35-31.62 linux-image-2.6.35-31-generic-pae 2.6.35-31.62 linux-image-2.6.35-31-omap 2.6.35-31.62 linux-image-2.6.35-31-powerpc 2.6.35-31.62 linux-image-2.6.35-31-powerpc-smp 2.6.35-31.62 linux-image-2.6.35-31-powerpc64-smp 2.6.35-31.62 linux-image-2.6.35-31-server 2.6.35-31.62 linux-image-2.6.35-31-versatile 2.6.35-31.62 linux-image-2.6.35-31-virtual 2.6.35-31.62
http://www.securityspace.com/smysecure/catid.html?in=USN-1272-1
|