Description: | Description: The remote host is missing an update to linux-image-2.6.35-31-generic announced via advisory USN-1278-1.
Details:
It was discovered that CIFS incorrectly handled authentication. When a user had a CIFS share mounted that required authentication, a local user could mount the same share without knowing the correct password. (CVE-2011-1585)
Andrea Righi discovered a race condition in the KSM memory merging support. If KSM was being used, a local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2183)
Vasily Averin discovered that the NFS Lock Manager (NLM) incorrectly handled unlock requests. A local attacker could exploit this to cause a denial of service. (CVE-2011-2491)
Robert Swiecki discovered that mapping extensions were incorrectly handled. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2496)
It was discovered that the wireless stack incorrectly verified SSID lengths. A local attacker could exploit this to cause a denial of service or gain root privileges. (CVE-2011-2517)
Solution: The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.04 LTS: linux-image-2.6.35-31-generic 2.6.35-31.62~ lucid1 linux-image-2.6.35-31-generic-pae 2.6.35-31.62~ lucid1 linux-image-2.6.35-31-server 2.6.35-31.62~ lucid1 linux-image-2.6.35-31-virtual 2.6.35-31.62~ lucid1
http://www.securityspace.com/smysecure/catid.html?in=USN-1278-1
|