Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.57102
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2006:123 (kernel)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to kernel
announced via advisory MDKSA-2006:123.

A number of vulnerabilities were discovered and corrected in the Linux
2.6 kernel. For details, please visit the referenced security
advisories.

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate

Affected: 2006.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2006:123
http://qa.mandriva.com/show_bug.cgi?id=22860

Risk factor : Critical

CVSS Score:
10.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-1343
BugTraq ID: 17203
http://www.securityfocus.com/bid/17203
Bugtraq: 20060531 rPSA-2006-0087-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/435490/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
http://www.securityfocus.com/archive/1/451419/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
http://www.securityfocus.com/archive/1/451404/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451417/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451426/100/200/threaded
Debian Security Information: DSA-1097 (Google Search)
http://www.debian.org/security/2006/dsa-1097
Debian Security Information: DSA-1184 (Google Search)
http://www.debian.org/security/2006/dsa-1184
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
http://marc.info/?l=linux-netdev&m=114148078223594&w=2
http://www.osvdb.org/29841
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10875
http://www.redhat.com/support/errata/RHSA-2006-0437.html
http://www.redhat.com/support/errata/RHSA-2006-0575.html
http://www.redhat.com/support/errata/RHSA-2006-0579.html
http://www.redhat.com/support/errata/RHSA-2006-0580.html
http://secunia.com/advisories/19357
http://secunia.com/advisories/19955
http://secunia.com/advisories/20671
http://secunia.com/advisories/21045
http://secunia.com/advisories/21136
http://secunia.com/advisories/21465
http://secunia.com/advisories/21983
http://secunia.com/advisories/22093
http://secunia.com/advisories/22417
http://secunia.com/advisories/22875
http://www.trustix.org/errata/2006/0032/
https://usn.ubuntu.com/281-1/
http://www.vupen.com/english/advisories/2006/2071
http://www.vupen.com/english/advisories/2006/4502
XForce ISS Database: linux-sockaddr-memory-leak(25425)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25425
Common Vulnerability Exposure (CVE) ID: CVE-2006-1368
BugTraq ID: 17831
http://www.securityfocus.com/bid/17831
Debian Security Information: DSA-1103 (Google Search)
http://www.debian.org/security/2006/dsa-1103
http://secunia.com/advisories/19330
http://secunia.com/advisories/20914
http://www.vupen.com/english/advisories/2006/1046
http://www.vupen.com/english/advisories/2006/2554
Common Vulnerability Exposure (CVE) ID: CVE-2006-1528
18101
http://www.securityfocus.com/bid/18101
20237
http://secunia.com/advisories/20237
20716
http://secunia.com/advisories/20716
21045
21179
http://secunia.com/advisories/21179
21498
http://secunia.com/advisories/21498
21555
http://secunia.com/advisories/21555
21745
http://secunia.com/advisories/21745
22082
http://secunia.com/advisories/22082
22093
ADV-2006-3330
http://www.vupen.com/english/advisories/2006/3330
DSA-1183
http://www.debian.org/security/2006/dsa-1183
DSA-1184
MDKSA-2006:123
RHSA-2006:0493
http://www.redhat.com/support/errata/RHSA-2006-0493.html
SUSE-SA:2006:042
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
SUSE-SA:2006:047
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
USN-302-1
http://www.ubuntu.com/usn/usn-302-1
http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1
http://linux.bkbits.net:8080/linux-2.6/cset%4043220081yu9ClBQNuqSSnW_9amW7iQ
http://marc.info/?l=linux-scsi&m=112540053711489&w=2
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168791
kernel-sg-dos(28510)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28510
oval:org.mitre.oval:def:11037
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11037
Common Vulnerability Exposure (CVE) ID: CVE-2006-1856
18105
http://www.securityfocus.com/bid/18105
25747
http://www.osvdb.org/25747
[linux-kernel] 20060426 [PATCH] LSM: add missing hook to do_compat_readv_writev()
http://www.ussg.iu.edu/hypermail/linux/kernel/0604.3/0777.html
[linux-security-module] 20050928 readv/writev syscalls are not checked by lsm
http://lists.jammed.com/linux-security-module/2005/09/0019.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191524
oval:org.mitre.oval:def:9927
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9927
Common Vulnerability Exposure (CVE) ID: CVE-2006-1857
18085
http://www.securityfocus.com/bid/18085
20185
http://secunia.com/advisories/20185
20671
20914
21465
21476
http://secunia.com/advisories/21476
22417
25695
http://www.osvdb.org/25695
ADV-2006-1893
http://www.vupen.com/english/advisories/2006/1893
ADV-2006-2554
DSA-1097
DSA-1103
MDKSA-2006:150
RHSA-2006:0575
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
linux-sctp-hback-dos(26584)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26584
oval:org.mitre.oval:def:10622
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10622
Common Vulnerability Exposure (CVE) ID: CVE-2006-1858
21605
http://secunia.com/advisories/21605
22174
http://secunia.com/advisories/22174
25696
http://www.osvdb.org/25696
RHSA-2006:0617
http://www.redhat.com/support/errata/RHSA-2006-0617.html
http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
linux-sctp-parameter-dos(26585)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26585
oval:org.mitre.oval:def:9510
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9510
Common Vulnerability Exposure (CVE) ID: CVE-2006-1859
BugTraq ID: 18033
http://www.securityfocus.com/bid/18033
http://secunia.com/advisories/20083
SuSE Security Announcement: SUSE-SA:2006:042 (Google Search)
http://www.trustix.org/errata/2006/0028
http://www.vupen.com/english/advisories/2006/1767
XForce ISS Database: linux-locks-setlease-dos(26438)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26438
Common Vulnerability Exposure (CVE) ID: CVE-2006-1860
BugTraq ID: 17943
http://www.securityfocus.com/bid/17943
http://www.osvdb.org/25425
XForce ISS Database: linux-locks-lease-init-dos(26437)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26437
Common Vulnerability Exposure (CVE) ID: CVE-2006-2274
BugTraq ID: 17955
http://www.securityfocus.com/bid/17955
http://www.osvdb.org/25746
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531
http://secunia.com/advisories/20398
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.trustix.org/errata/2006/0026
XForce ISS Database: linux-sctp-skb-pull-dos(26432)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432
Common Vulnerability Exposure (CVE) ID: CVE-2006-2445
BugTraq ID: 18615
http://www.securityfocus.com/bid/18615
Bugtraq: 20060623 rPSA-2006-0110-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/438168/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=30f1e3dd8c72abda343bcf415f7d8894a02b4290
http://marc.info/?l=linux-kernel&m=115015841413687
http://www.osvdb.org/26947
http://secunia.com/advisories/20703
http://secunia.com/advisories/20831
http://secunia.com/advisories/20991
http://www.trustix.org/errata/2006/0037
http://www.ubuntu.com/usn/usn-311-1
http://www.vupen.com/english/advisories/2006/2451
XForce ISS Database: linux-runposixcputimers-dos(27380)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27380
Common Vulnerability Exposure (CVE) ID: CVE-2006-3085
BugTraq ID: 18550
http://www.securityfocus.com/bid/18550
http://www.osvdb.org/26680
http://securitytracker.com/id?1016347
SuSE Security Announcement: SUSE-SA:2006:047 (Google Search)
XForce ISS Database: linux-xt-sctp-dos(27384)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27384
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.