SUSE-SA:2005:050 kernel patch fixes critical vulnerabilitie
Reporter | Title | Published | Views | Family All 101 |
---|---|---|---|---|
SUSE Linux | denial of service, local privilege escalation in kernel | 1 Sep 200514:31 | โ | suse |
SUSE Linux | denial of service in kernel | 14 Dec 200515:10 | โ | suse |
SUSE Linux | local privilege escalation in kernel | 9 Jun 200511:10 | โ | suse |
OpenVAS | SLES9: Security update for Linux kernel | 10 Oct 200900:00 | โ | openvas |
OpenVAS | SLES9: Security update for Linux kernel | 10 Oct 200900:00 | โ | openvas |
OpenVAS | Debian Security Advisory DSA 921-1 (kernel-source-2.4.27) | 17 Jan 200800:00 | โ | openvas |
OpenVAS | Debian: Security Advisory (DSA-921-1) | 17 Jan 200800:00 | โ | openvas |
OpenVAS | Debian: Security Advisory (DSA-922-1) | 17 Jan 200800:00 | โ | openvas |
OpenVAS | Debian Security Advisory DSA 922-1 (kernel-source-2.4.27) | 17 Jan 200800:00 | โ | openvas |
OpenVAS | Debian: Security Advisory (DSA-1018-1) | 17 Jan 200800:00 | โ | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2005:050
#
if ( ! defined_func("bn_random") ) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if(description)
{
script_id(19929);
script_version("1.9");
name["english"] = "SUSE-SA:2005:050: kernel";
script_name(english:name["english"]);
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
script_set_attribute(attribute:"description", value:
"The remote host is missing the patch for the advisory SUSE-SA:2005:050 (kernel).
The Linux kernel was updated to fix the following security issues:
- CVE-2005-2457: A problem in decompression of files on 'zisofs'
filesystem was fixed.
- CVE-2005-2458: A potential buffer overflow in the zlib decompression
handling in the kernel was fixed.
- CVE-2005-2459: Some return codes in zlib decoding were fixed which
could have led to an attacker crashing the kernel.
- CVE-2005-2555: Only processes with the CAP_NET_ADMIN capability is
now allowed load socket policies.
- CVE-2005-2456: Fixed a potential overflow caused by missing boundary
checks of sock->sk_policy in net/xfrm/.
- AMD64/EM64T/x86_64 only: A previous fix for a denial of service
attack with compat 32bit mode programs was too strict and could
crash the kernel. (The earlier fix had the Mitre CVE ID CVE-2005-1765.)
- S/390 only: Fixed /sys/ permissions where a user could change machine
states, including powering down or up partitions.
- CVE-2005-0916: PowerPC only: A missing patch for a hugetlb memory
context handling problem was added.
Above problems affect SUSE Linux 9.1 up to 9.3 and SUSE Linux
Enterprise Server 9." );
script_set_attribute(attribute:"solution", value:
"http://www.suse.de/security/advisories/2005_50_kernel.html" );
script_set_attribute(attribute:"risk_factor", value:"High" );
script_set_attribute(attribute:"plugin_publication_date", value: "2005/10/05");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_end_attributes();
summary["english"] = "Check for the version of the kernel package";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2005-2021 Tenable Network Security, Inc.");
family["english"] = "SuSE Local Security Checks";
script_family(english:family["english"]);
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/SuSE/rpm-list");
exit(0);
}
include("rpm.inc");
if ( rpm_check( reference:"kernel-bigsmp-2.6.5-7.201", release:"SUSE9.1") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-default-2.6.5-7.201", release:"SUSE9.1") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-smp-2.6.5-7.201", release:"SUSE9.1") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-source-2.6.5-7.201", release:"SUSE9.1") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-syms-2.6.5-7.201", release:"SUSE9.1") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"ltmodem-2.6.2-38.18", release:"SUSE9.1") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-docs-2.6.5-7.201", release:"SUSE9.1") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"Intel-536ep-4.69-5.11", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-bigsmp-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-bigsmp-nongpl-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-default-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-default-nongpl-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-smp-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-smp-nongpl-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-source-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-syms-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-um-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-um-nongpl-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"ltmodem-8.31a8-6.11", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"um-host-install-initrd-1.0-48.10", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"um-host-kernel-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-docs-2.6.8-24.18", release:"SUSE9.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"Intel-536ep-4.69-10.3", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"dprobes-3.6.5-8.3", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-bigsmp-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-bigsmp-nongpl-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-default-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-default-nongpl-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-smp-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-smp-nongpl-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-source-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-syms-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-um-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-um-nongpl-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-xen-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-xen-nongpl-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"ltmodem-8.31a10-7.3", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"um-host-install-initrd-1.0-50.3", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"um-host-kernel-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"kernel-docs-2.6.11.4-21.9", release:"SUSE9.3") )
{
security_hole(0);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo