Description: | Description:
The remote host is missing updates announced in advisory TSLSA-2005-0049.
kernel < TSL 3.0 > - SECURITY Fix: Fix unchecked __get_user that could be tricked into generating a memory read on an arbitrary address. The result of the read is not returned directly but you may be able to divine some information about it, or use the read to cause a crash on some architectures by reading hardware state.
The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2492 to this issue.
- SECURITY Fix: Al Viro reported a flaw in sendmsg(). When we copy 32bit ->msg_control contents to kernel, we walk the same userland data twice without sanity checks on the second pass. Moreover, if original looks small enough, we end up copying to on-stack array.
The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2490 to this issue.
util-linux < TSL 3.0 > < TSL 2.2 > < TSEL-2 > - SECURITY Fix: unintentional grant of privileges by umount in util-linux allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags. (SA16795)
xorg-x11 < TSL 3.0 > - SECURITY Fix: Heap overflow in pixmap allocation, An integer overflow in pixmap memory allocation potentially allows any xorg-x11 user to execute arbitrary code with elevated privileges.
The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2495 to this issue.
Solution: Update your system with the packages as indicated in the referenced security advisory.
https://secure1.securityspace.com/smysecure/catid.html?in=TSLSA-2005-0049
Risk factor : High
CVSS Score: 5.1
|