Description: | Description:
The remote host is missing an update to kernel announced via advisory MDKSA-2005:171.
A number of vulnerabilities in the 2.6 Linux kernel have been corrected with these updated packages:
An array index overflow in the xfrm_sk_policy_insert function could allow a local user to cause a Denial of Service (oops or deadlock) and possibly execute arbitrary code (CVE-2005-2456).
The zlib routines in the Linux 2.6 kernel before 2.6.12.5 allowed a remote attacker to cause a DoS (crash) via a compressed file with improper tables (CVE-2005-2458).
The huft_build function in the zlib routines in Linux 2.6 kernels prior to 2.6.12.5 returned the wrong value, allowing remote attackers to cause a DoS (crash) via a certain compressed file (CVE-2005-2459).
A stack-based buffer overflow in the sendmsg function call in Linux 2.6 kernels prior to 2.6.13.1 allow local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread (CVE-2005-2490).
xattr.c in the ext2 and ext3 file system code in the 2.6 Linux kernel did not properly compare the name_index fields when sharing xattr blocks which would prevent default ACLs from being applied (CVE-2005-2801).
The ipt_recent kernel module in 2.6 Linux kernels prior to 2.6.12 when running on 64-bit processors allowed remote attackers to cause a DoS (kernel panic) via certain attacks such as SSH brute force (CVE-2005-2872).
The ipt_recent kernel module in 2.6 Linux kernels prior to 2.6.12 did not properly perform certain time tests when the jiffies value is greater than LONG_MAX which could cause ipt_recent netfilter rules to block too early (CVE-2005-2873).
The updated packages have been patched to address these issues and all users are urged to upgrade immediately.
Updated kernels for Mandrivalinux 10.1 and later will be made available soon.
Affected versions: Corporate 3.0, Multi Network Firewall 2.0
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2005:171
Risk factor : Medium
CVSS Score: 5.0
|