Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56597
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2006:040 (kernel)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to kernel
announced via advisory MDKSA-2006:040.

A number of vulnerabilities were discovered and corrected in the Linux
2.6 kernel:

The udp_v6_get_port function in udp.c, when running IPv6, allows local
users to cause a Denial of Service (infinite loop and crash)
(CVE-2005-2973).

The mq_open system call in certain situations can decrement a counter
twice as a result of multiple calls to the mntput function when the
dentry_open function call fails, allowing a local user to cause a DoS
(panic) via unspecified attack vectors (CVE-2005-3356).

The procfs code allows attackers to read sensitive kernel memory via
unspecified vectors in which a signed value is added to an unsigned
value (CVE-2005-4605).

A buffer overflow in sysctl allows local users to cause a DoS and
possibly execute arbitrary code via a long string, which causes sysctl
to write a zero byte outside the buffer (CVE-2005-4618).

A buffer overflow in the CA-driver for TwinHan DST Frontend/Card allows
local users to cause a DoS (crash) and possibly execute arbitrary code
by reading more than eight bytes into an eight byte long array
(CVE-2005-4639).

dm-crypt does not clear a structure before it is freed, which leads to
a memory disclosure that could allow local users to obtain sensitive
information about a cryptographic key (CVE-2006-0095).

Remote attackers can cause a DoS via unknown attack vectors related to
an extra dst release when ip_options_echo fails in icmp.c
(CVE-2006-0454).

In addition to these security fixes, other fixes have been included
such as:

- support for mptsas
- fix for IPv6 with sis190
- a problem with the time progressing twice as fast
- a fix for Audigy 2 ZS Video Editor sample rates
- a fix for a supermount crash when accessing a supermount-ed CD/DVD
drive
- a fix for improperly unloading sbp2 module

The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels.

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate

Affected: 2006.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2006:040

Risk factor : Medium

CVSS Score:
5.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-2973
15156
http://www.securityfocus.com/bid/15156
17261
http://secunia.com/advisories/17261
17280
http://secunia.com/advisories/17280
17917
http://secunia.com/advisories/17917
17918
http://secunia.com/advisories/17918
18562
http://secunia.com/advisories/18562
18684
http://secunia.com/advisories/18684
19185
http://secunia.com/advisories/19185
19369
http://secunia.com/advisories/19369
19374
http://secunia.com/advisories/19374
20163
http://www.osvdb.org/20163
20237
http://secunia.com/advisories/20237
21745
http://secunia.com/advisories/21745
ADV-2005-2173
http://www.vupen.com/english/advisories/2005/2173
DSA-1017
http://www.debian.org/security/2006/dsa-1017
DSA-1018
http://www.debian.org/security/2006/dsa-1018
FEDORA-2005-1007
http://www.securityfocus.com/advisories/9549
FEDORA-2005-1013
http://www.securityfocus.com/advisories/9555
FLSA:157459-1
http://www.securityfocus.com/archive/1/428028/100/0/threaded
FLSA:157459-2
http://www.securityfocus.com/archive/1/428058/100/0/threaded
FLSA:157459-3
http://www.securityfocus.com/archive/1/427980/100/0/threaded
MDKSA-2006:040
http://www.mandriva.com/security/advisories?name=MDKSA-2006:040
MDKSA-2006:072
http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
RHSA-2006:0140
http://www.redhat.com/support/errata/RHSA-2006-0140.html
RHSA-2006:0190
http://www.redhat.com/support/errata/RHSA-2006-0190.html
RHSA-2006:0191
http://www.redhat.com/support/errata/RHSA-2006-0191.html
RHSA-2006:0493
http://www.redhat.com/support/errata/RHSA-2006-0493.html
SUSE-SA:2005:067
http://www.securityfocus.com/advisories/9806
SUSE-SA:2005:068
http://www.securityfocus.com/archive/1/419522/100/0/threaded
USN-219-1
https://usn.ubuntu.com/219-1/
http://linux.bkbits.net:8080/linux-2.6/cset%404342df67SNhRx_3FGhUrrU-FXLlQIA
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170772
oval:org.mitre.oval:def:10041
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10041
Common Vulnerability Exposure (CVE) ID: CVE-2005-3356
16283
http://www.securityfocus.com/bid/16283
18510
http://secunia.com/advisories/18510
18527
http://secunia.com/advisories/18527
18788
http://secunia.com/advisories/18788
19038
http://secunia.com/advisories/19038
FLSA:157459-4
http://www.securityfocus.com/archive/1/427981/100/0/threaded
RHSA-2006:0101
http://rhn.redhat.com/errata/RHSA-2006-0101.html
SUSE-SA:2006:006
http://www.novell.com/linux/security/advisories/2006_06_kernel.html
SUSE-SA:2006:012
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html
USN-244-1
https://usn.ubuntu.com/244-1/
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169130
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c7dce9209161eb260cdf9e9172f72c3a02379e6
linux-double-decrement-dos(25302)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25302
oval:org.mitre.oval:def:10731
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10731
Common Vulnerability Exposure (CVE) ID: CVE-2005-4605
16284
http://www.securityfocus.com/bid/16284
18216
http://secunia.com/advisories/18216
18351
http://secunia.com/advisories/18351
20051223 linux procfs vulnerablity
http://marc.info/?l=full-disclosure&m=113535380422339&w=2
http://www.redhat.com/support/errata/RHSA-2006-0101.html
http://linux.bkbits.net:8080/linux-2.6/cset%4043b562ae6hJGLWZA4TNf2k-RzXnVlQ
http://linux.bkbits.net:8080/linux-2.6/gnupatch%4043b562ae6hJGLWZA4TNf2k-RzXnVlQ
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8b90db0df7187a01fb7177f1f812123138f562cf
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00014.html
linux-procfs-information-disclosure(23811)
https://exchange.xforce.ibmcloud.com/vulnerabilities/23811
oval:org.mitre.oval:def:11747
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11747
Common Vulnerability Exposure (CVE) ID: CVE-2005-4618
BugTraq ID: 16141
http://www.securityfocus.com/bid/16141
Debian Security Information: DSA-1017 (Google Search)
Debian Security Information: DSA-1018 (Google Search)
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8febdd85adaa41fa1fc1cb31286210fc2cd3ed0c
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
http://www.vupen.com/english/advisories/2006/0035
Common Vulnerability Exposure (CVE) ID: CVE-2005-4639
BugTraq ID: 16142
http://www.securityfocus.com/bid/16142
XForce ISS Database: linux-kernel-cadriver-bo(43323)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43323
Common Vulnerability Exposure (CVE) ID: CVE-2006-0095
BugTraq ID: 16301
http://www.securityfocus.com/bid/16301
http://www.redhat.com/archives/fedora-announce-list/2006-February/msg00037.html
http://marc.info/?l=linux-kernel&m=113641114812886&w=2
http://marc.info/?l=linux-kernel&m=113640535312572&w=2
http://www.osvdb.org/22418
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11192
http://www.redhat.com/support/errata/RHSA-2006-0132.html
http://securitytracker.com/id?1015740
http://secunia.com/advisories/18487
http://secunia.com/advisories/18774
http://secunia.com/advisories/19160
http://secunia.com/advisories/20398
http://securityreason.com/securityalert/388
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.trustix.org/errata/2006/0004
http://www.vupen.com/english/advisories/2006/0235
XForce ISS Database: kernel-dmcrypt-information-disclosure(24189)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24189
Common Vulnerability Exposure (CVE) ID: CVE-2006-0454
16532
http://www.securityfocus.com/bid/16532
18766
http://secunia.com/advisories/18766
18774
18784
http://secunia.com/advisories/18784
18861
http://secunia.com/advisories/18861
2006-0006
http://www.trustix.org/errata/2006/0006
ADV-2006-0464
http://www.vupen.com/english/advisories/2006/0464
FEDORA-2006-102
USN-250-1
http://www.ubuntu.com/usn/usn-250-1
[dailydave] 20060207 Fun with Linux (2.6.12 -> 2.6.15.2)
http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html
[linux-kernel] 20060207 Linux 2.6.15.3
http://marc.info/?l=linux-kernel&m=113927617401569&w=2
[linux-kernel] 20060207 Re: Linux 2.6.15.3
http://marc.info/?l=linux-kernel&m=113927648820694&w=2
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3
kernel-icmp-ipoptionsecho-dos(24575)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24575
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.