Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2004.38.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-38-1)
Summary:The remote host is missing an update for the 'linux-meta, linux-restricted-modules-2.6.8.1, linux-source-2.6.8.1' package(s) announced via the USN-38-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-meta, linux-restricted-modules-2.6.8.1, linux-source-2.6.8.1' package(s) announced via the USN-38-1 advisory.

Vulnerability Insight:
CAN-2004-0814:

Vitaly V. Bursov discovered a Denial of Service vulnerability in the 'serio'
code, opening the same tty device twice and doing some particular operations on
it caused a kernel panic and/or a system lockup.

Fixing this vulnerability required a change in the Application Binary
Interface (ABI) of the kernel. This means that third party user installed
modules might not work any more with the new kernel, so this fixed kernel got
a new ABI version number. You have to recompile and reinstall all third party
modules.

CAN-2004-1016:

Paul Starzetz discovered a buffer overflow vulnerability in the '__scm_send'
function which handles the sending of UDP network packets. A wrong validity
check of the cmsghdr structure allowed a local attacker to modify kernel
memory, thus causing an endless loop (Denial of Service) or possibly even
root privilege escalation.

CAN-2004-1056:

Thomas Hellstrom discovered a Denial of Service vulnerability in the Direct
Rendering Manager (DRM) drivers. Due to an insufficient DMA lock checking,
any authorized client could send arbitrary values to the video card, which
could cause an X server crash or modification of the video output.

CAN-2004-1058:

Rob Landley discovered a race condition in the handling of /proc/.../cmdline.
Under very rare circumstances an user could read the environment variables of
another process that was still spawning. Environment variables are often used
to pass passwords and other private information to other processes.

CAN-2004-1068:

A race condition was discovered in the handling of AF_UNIX network packets.
This reportedly allowed local users to modify arbitrary kernel memory,
facilitating privilege escalation, or possibly allowing code execution in the
context of the kernel.

CAN-2004-1069:

Ross Kendall Axe discovered a possible kernel panic (causing a Denial of
Service) while sending AF_UNIX network packages if the kernel options
CONFIG_SECURITY_NETWORK and CONFIG_SECURITY_SELINUX are enabled. This is not
the case in the kernel packages shipped in Warty Warthog, however, if you
recompiled the kernel using SELinux, you are affected by this flaw.

CAN-2004-1137:

Paul Starzetz discovered several flaws in the IGMP handling code. This
allowed users to provoke a Denial of Service, read kernel memory, and execute
arbitrary code with root privileges. This flaw is also exploitable remotely
if an application has bound a multicast socket.

CAN-2004-1151:

Jeremy Fitzhardinge discovered two buffer overflows in the sys32_ni_syscall()
and sys32_vm86_warning() functions. This could possibly be exploited to
overwrite kernel memory with attacker-supplied code and cause root privilege
escalation.

This vulnerability only affects the amd64 architecture.

Affected Software/OS:
'linux-meta, linux-restricted-modules-2.6.8.1, linux-source-2.6.8.1' package(s) on Ubuntu 4.10.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0814
BugTraq ID: 11491
http://www.securityfocus.com/bid/11491
BugTraq ID: 11492
http://www.securityfocus.com/bid/11492
Bugtraq: 20041020 CAN-2004-0814: Linux terminal layer races (Google Search)
http://www.securityfocus.com/archive/1/379005
Bugtraq: 20041214 [USN-38-1] Linux kernel vulnerabilities (Google Search)
http://marc.info/?l=bugtraq&m=110306397320336&w=2
https://bugzilla.fedora.us/show_bug.cgi?id=2336
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728
http://www.redhat.com/support/errata/RHSA-2005-293.html
XForce ISS Database: linux-tiocsetd-race-condition(17816)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17816
Common Vulnerability Exposure (CVE) ID: CVE-2004-1016
BugTraq ID: 11921
http://www.securityfocus.com/bid/11921
Debian Security Information: DSA-1067 (Google Search)
http://www.debian.org/security/2006/dsa-1067
Debian Security Information: DSA-1069 (Google Search)
http://www.debian.org/security/2006/dsa-1069
Debian Security Information: DSA-1070 (Google Search)
http://www.debian.org/security/2006/dsa-1070
Debian Security Information: DSA-1082 (Google Search)
http://www.debian.org/security/2006/dsa-1082
http://isec.pl/vulnerabilities/isec-0019-scm.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816
http://www.redhat.com/support/errata/RHSA-2004-689.html
http://www.redhat.com/support/errata/RHSA-2005-016.html
http://www.redhat.com/support/errata/RHSA-2005-017.html
http://secunia.com/advisories/20162
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
SuSE Security Announcement: SUSE-SA:2004:044 (Google Search)
http://www.novell.com/linux/security/advisories/2004_44_kernel.html
https://www.ubuntu.com/usn/usn-38-1/
XForce ISS Database: linux-scmsend-dos(18483)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18483
Common Vulnerability Exposure (CVE) ID: CVE-2004-1056
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795
http://www.redhat.com/support/errata/RHSA-2005-092.html
http://www.redhat.com/support/errata/RHSA-2005-529.html
http://www.redhat.com/support/errata/RHSA-2005-551.html
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://secunia.com/advisories/17002
http://www.vupen.com/english/advisories/2005/1878
XForce ISS Database: linux-i810-dma-dos(15972)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15972
Common Vulnerability Exposure (CVE) ID: CVE-2004-1058
BugTraq ID: 11052
http://www.securityfocus.com/bid/11052
BugTraq ID: 11937
http://www.securityfocus.com/bid/11937
Debian Security Information: DSA-1018 (Google Search)
http://www.debian.org/security/2006/dsa-1018
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://secunia.com/advisories/18684
http://secunia.com/advisories/19038
http://secunia.com/advisories/19369
http://secunia.com/advisories/19607
http://secunia.com/advisories/21476
SGI Security Advisory: 20060402-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
SuSE Security Announcement: SUSE-SA:2006:012 (Google Search)
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html
https://usn.ubuntu.com/38-1/
XForce ISS Database: linux-spawning-race-condition(17151)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17151
Common Vulnerability Exposure (CVE) ID: CVE-2004-1068
BugTraq ID: 11715
http://www.securityfocus.com/bid/11715
Bugtraq: 20041119 Addendum, recent Linux <= 2.4.27 vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/381689
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384
http://www.redhat.com/support/errata/RHSA-2004-504.html
http://www.redhat.com/support/errata/RHSA-2004-505.html
http://www.redhat.com/support/errata/RHSA-2004-537.html
XForce ISS Database: linux-afunix-race-condition(18230)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18230
Common Vulnerability Exposure (CVE) ID: CVE-2004-1069
http://marc.info/?l=linux-kernel&m=110045613004761
XForce ISS Database: linux-sockdgramsendmsg-race-condition(18312)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18312
Common Vulnerability Exposure (CVE) ID: CVE-2004-1137
Bugtraq: 20041214 Linux kernel IGMP vulnerabilities (Google Search)
Conectiva Linux advisory: CLA-2005:930
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
http://isec.pl/vulnerabilities/isec-0018-igmp.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144
XForce ISS Database: linux-igmpmarksources-dos(18482)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18482
XForce ISS Database: linux-ipmcsource-code-execution(18481)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18481
Common Vulnerability Exposure (CVE) ID: CVE-2004-1151
http://linux.bkbits.net:8080/linux-2.6/cset@1.2079
http://linux.bkbits.net:8080/linux-2.6/gnupatch@41ae6af1cR3mJYlW6D8EHxCKSxuJiQ
http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.