Description: | Description:
The remote host is missing updates announced in advisory CLA-2005:930.
The following issues have been fixed in the associated files:
1 a.out local DoS (CVE-2004-1074) 2 IGMP vulnerability (CVE-2004-1137) 3 uselib local privilege escalation vulnerability (CVE-2004-1235) 4 LSM Module Local Privilege Elevation (CAN 2004-1337) 5 i386 SMP page fault handler privilege escalation (CVE-2005-0001) 6 SHM insufficient permission checking (CVE-2005-0176) 7 Local DoS in nls_ascii.c (CVE-2005-0177) 8 setsid local DoS (CVE-2005-0178) 9 mlockall local DoS (CVE-2005-0179) 10 Integer signedness errors in scsi functions (CVE-2005-0180) 11 NFS client O_DIRECT error (CVE-2005-0207) 12 /proc heap overflow (CVE-2005-0529) 13 Signedess error in n_tty.c (CVE-2005-0530) 14 Possible buffer oferflow in atm_get_addr() (CVE-2005-0531) 15 read/write VFS range checking
Please note that a number of drivers included in this package have known issues, including those for NVidia, and winmodem drivers slmodem and ltmodem.
For complete details, please visit the referenced advisory.
Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade'
http://linux.bkbits.net:8080/linux-2.6/cset@41db2d65wbgJvuXTv4x9_quExW0vEA http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html http://linux.bkbits.net:8080/linux-2.6/patch@1.1966.1.68 http://linux.bkbits.net:8080/linux-2.6/patch@1.1966.1.67 http://www.conectiva.com.br/suporte/pr/sistema.kernel.atualizar.html http://www.securityspace.com/smysecure/catid.html?in=CLA-2005:930 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
Risk factor : Critical
CVSS Score: 10.0
|