New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 6.3
SynopsisThe remote Mandrake Linux host is missing one or more security updates.
DescriptionA number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel :
sysctl.c in the Linux kernel prior to 220.127.116.11 allows local users to cause a Denial of Service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table (CVE-2005-2709).
Multiple vulnerabilities in versions prior to 18.104.22.168 allow local users to cause a DoS (oops from null dereference) via fput in a 32bit ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl function on 64-bit systems (CVE-2005-3044). Note that this was previously partially corrected in MDKSA-2005:235.
Prior to 2.6.14, the kernel's atm module allows local users to cause a DoS (panic) via certain socket calls that produce inconsistent reference counts for loadable protocol modules (CVE-2005-3359).
A race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in the 2.6.x kernel allows local users to cause a DoS (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory (CVE-2006-0457).
Prior to 22.214.171.124, the kernel allows local users to obtain sensitive information via a crafted XFS ftruncate call, which may return stale data (CVE-2006-0554).
Prior to 126.96.36.199, the kernel allows local users to cause a DoS (NFS client panic) via unknown attack vectors related to the use of O_DIRECT (CVE-2006-0555).
Prior to an including kernel 2.6.16, sys_mbind in mempolicy.c does not sanity check the maxnod variable before making certain computations, which has an unknown impact and attack vectors (CVE-2006-0557).
Prior to 188.8.131.52, the kernel allows local users to cause a DoS ('endless recursive fault') via unknown attack vectors related to a 'bad elf entry address' on Intel processors (CVE-2006-0741).
Prior to 184.108.40.206, the die_if_kernel function in the kernel can allow local users to cause a DoS by causing user faults on Itanium systems (CVE-2006-00742).
A race in the signal-handling code which allows a process to become unkillable when the race is triggered was also fixed.
In addition to these security fixes, other fixes have been included such as :
- add ich8 support
- libata locking rewrite
- libata clear ATA_QCFLAG_ACTIVE flag before calling the completion callback
- support the Acer Aspire 5xxx/3xxx series in the acerhk module
- USB storage: remove info sysfs file as it violates the sysfs one value per file rule
- fix OOPS in sysfs_hash_and_remove_file()
- pl2303 USB driver fixes; makes pl2303HX chip work correctly
- fix OOPS in IPMI driver which is probably caused when trying to use ACPI functions when ACPI was not properly initialized
- fix de_thread() racy BUG_ON()
The provided packages are patched to fix these vulnerabilities. All users are encouraged to upgrade to these updated kernels.
To update your kernel, please follow the directions located at :
Please note that users using the LSI Logic 53c1030 dual-channel ultra 320 SCSI card will need to re-create their initrd images manually prior to rebooting in order to fix a bug that prevents booting. A future update will correct this problem. To do this, execute :
# rm /boot/initrd-2.6.12-18mdk.img # mkinitrd /boot/initrd-2.6.12-18mdk.img 2.6.12-18mdk --with-module=mptspi
SolutionUpdate the affected packages.