Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55610
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2005:171 (kernel)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to kernel
announced via advisory MDKSA-2005:171.

A number of vulnerabilities in the 2.6 Linux kernel have been corrected
with these updated packages:

An array index overflow in the xfrm_sk_policy_insert function could
allow a local user to cause a Denial of Service (oops or deadlock) and
possibly execute arbitrary code (CVE-2005-2456).

The zlib routines in the Linux 2.6 kernel before 2.6.12.5 allowed a
remote attacker to cause a DoS (crash) via a compressed file with
improper tables (CVE-2005-2458).

The huft_build function in the zlib routines in Linux 2.6 kernels prior
to 2.6.12.5 returned the wrong value, allowing remote attackers to
cause a DoS (crash) via a certain compressed file (CVE-2005-2459).

A stack-based buffer overflow in the sendmsg function call in Linux 2.6
kernels prior to 2.6.13.1 allow local users to execute arbitrary code by
calling sendmsg and modifying the message contents in another thread
(CVE-2005-2490).

xattr.c in the ext2 and ext3 file system code in the 2.6 Linux kernel
did not properly compare the name_index fields when sharing xattr
blocks which would prevent default ACLs from being applied
(CVE-2005-2801).

The ipt_recent kernel module in 2.6 Linux kernels prior to 2.6.12 when
running on 64-bit processors allowed remote attackers to cause a DoS
(kernel panic) via certain attacks such as SSH brute force
(CVE-2005-2872).

The ipt_recent kernel module in 2.6 Linux kernels prior to 2.6.12 did
not properly perform certain time tests when the jiffies value is
greater than LONG_MAX which could cause ipt_recent netfilter rules to
block too early (CVE-2005-2873).

The updated packages have been patched to address these issues and all
users are urged to upgrade immediately.

Updated kernels for Mandrivalinux 10.1 and later will be made available
soon.

Affected versions: Corporate 3.0, Multi Network Firewall 2.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2005:171

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-2456
BugTraq ID: 14477
http://www.securityfocus.com/bid/14477
Debian Security Information: DSA-921 (Google Search)
http://www.debian.org/security/2005/dsa-921
Debian Security Information: DSA-922 (Google Search)
http://www.debian.org/security/2005/dsa-922
http://www.securityfocus.com/archive/1/427980/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mail-archive.com/netdev@vger.kernel.org/msg00520.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10858
http://www.redhat.com/support/errata/RHSA-2005-514.html
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://secunia.com/advisories/16298
http://secunia.com/advisories/16500
http://secunia.com/advisories/17002
http://secunia.com/advisories/17073
http://secunia.com/advisories/17826
http://secunia.com/advisories/18056
http://secunia.com/advisories/18059
SuSE Security Announcement: SUSE-SA:2005:050 (Google Search)
http://www.novell.com/linux/security/advisories/2005_50_kernel.html
https://usn.ubuntu.com/169-1/
http://www.vupen.com/english/advisories/2005/1878
XForce ISS Database: linux-kernel-xfrm-dos(21710)
https://exchange.xforce.ibmcloud.com/vulnerabilities/21710
Common Vulnerability Exposure (CVE) ID: CVE-2005-2458
BugTraq ID: 14719
http://www.securityfocus.com/bid/14719
http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://www.securityfocus.com/archive/1/428058/100/0/threaded
http://sources.redhat.com/ml/bug-gnu-utils/1999-06/msg00183.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10785
http://www.redhat.com/support/errata/RHSA-2006-0101.html
http://www.redhat.com/support/errata/RHSA-2006-0144.html
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://secunia.com/advisories/16355/
http://secunia.com/advisories/17918
http://secunia.com/advisories/18510
http://secunia.com/advisories/18684
http://secunia.com/advisories/19252
SuSE Security Announcement: SUSE-SA:2005:068 (Google Search)
http://www.securityfocus.com/archive/1/419522/100/0/threaded
Common Vulnerability Exposure (CVE) ID: CVE-2005-2459
BugTraq ID: 14720
http://www.securityfocus.com/bid/14720
http://bugs.gentoo.org/show_bug.cgi?id=94584
Common Vulnerability Exposure (CVE) ID: CVE-2005-2490
14785
http://www.securityfocus.com/bid/14785
16747
http://secunia.com/advisories/16747/
17002
17073
17826
17918
19374
http://secunia.com/advisories/19374
2005-0049
http://marc.info/?l=bugtraq&m=112690609622266&w=2
ADV-2005-1878
DSA-1017
http://www.debian.org/security/2006/dsa-1017
FLSA:157459-1
FLSA:157459-2
FLSA:157459-3
MDKSA-2005:219
MDKSA-2005:220
MDKSA-2005:235
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
RHSA-2005:514
RHSA-2005:663
SUSE-SA:2005:068
USN-178-1
http://www.ubuntu.com/usn/usn-178-1
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248
kernel-sendmsg-bo(22217)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22217
oval:org.mitre.oval:def:10481
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10481
Common Vulnerability Exposure (CVE) ID: CVE-2005-2801
BugTraq ID: 14793
http://www.securityfocus.com/bid/14793
http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html
http://lists.debian.org/debian-kernel/2005/08/msg00238.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495
SuSE Security Announcement: SUSE-SA:2005:018 (Google Search)
http://www.novell.com/linux/security/advisories/2005_18_kernel.html
Common Vulnerability Exposure (CVE) ID: CVE-2005-2872
BugTraq ID: 14791
http://www.securityfocus.com/bid/14791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11394
Common Vulnerability Exposure (CVE) ID: CVE-2005-2873
http://blog.blackdown.de/2005/05/09/fixing-the-ipt_recent-netfilter-module/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9838
RedHat Security Advisories: RHBA-2007-0304
http://rhn.redhat.com/errata/RHBA-2007-0304.html
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.