Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56598
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2006:044 (kernel)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to kernel
announced via advisory MDKSA-2006:044.

A number of vulnerabilities have been discovered and corrected in the
Linux 2.4 kernel:

A numeric casting discrepancy in sdla_xfer could allow a local user to
read portions of kernel memory via a large len argument
(CVE-2004-2607).

The traps.c file executes stack segment faults on an exception stack,
which could allow a local user to cause an oops and stack fault
exception (CVE-2005-1767).

The find_target function in ptrace32.c does not properly handle a NULL
return value from another function, allowing local users to cause a
kernel crash/oops by running a 32-bit ltrace program with the -i option
on a 64-bit executable program (CVE-2005-2553).

A race condition in ip_vs_conn_flush, when running on SMP systems,
could allow a local attacker to cause null dereference DoS by causing
a connection timer to expire while the connection table is being
flushed before the appropriate lock is acquired (CVE-2005-3274).

The NAT code in ip_nat_proto_tcp.c and ip_nat_proto_udp.c incorrectly
declares a variable to be static, which could allow a remote attacker
to cause a Denial of Service via memory corruption by causing two
packets for the same protocol to be NATed at the same time
(CVE-2005-3275).

The IPv6 flowlabel handling code modified the wrong variable in certain
circumstances, which could allow a local user to corrupt kernel memory
or cause a Denial of Service (crash) by triggering a free of non-
allocated memory (CVE-2005-3806).

The wan/sdla.c file does not require CAP_SYS_RAWIO privilege for an
SDLA firmware upgrade with unknown impact and local attack vectors
(CVE-2006-0096).

The provided packages are patched to fix these vulnerabilities. All
users are encouraged to upgrade to these updated kernels.

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate

Affected: Corporate 2.1, Corporate 3.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2006:044

Risk factor : High

CVSS Score:
7.2

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-2607
BugTraq ID: 16759
http://www.securityfocus.com/bid/16759
Debian Security Information: DSA-1018 (Google Search)
http://www.debian.org/security/2006/dsa-1018
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044
http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
http://www.uwsg.iu.edu/hypermail/linux/kernel/0404.2/0313.html
http://www.uwsg.iu.edu/hypermail/linux/kernel/0404.2/0743.html
http://secunia.com/advisories/18977
http://secunia.com/advisories/19369
Common Vulnerability Exposure (CVE) ID: CVE-2005-1767
14467
http://www.securityfocus.com/bid/14467
17002
http://secunia.com/advisories/17002
18056
http://secunia.com/advisories/18056
18059
http://secunia.com/advisories/18059
18977
ADV-2005-1878
http://www.vupen.com/english/advisories/2005/1878
DSA-921
http://www.debian.org/security/2005/dsa-921
DSA-922
http://www.debian.org/security/2005/dsa-922
MDKSA-2006:044
RHSA-2005:663
http://www.redhat.com/support/errata/RHSA-2005-663.html
SUSE-SA:2005:044
http://www.novell.com/linux/security/advisories/2005_44_kernel.html
USN-187-1
http://www.ubuntu.com/usn/usn-187-1
http://kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=51e31546a2fc46cb978da2ee0330a6a68f07541e
oval:org.mitre.oval:def:11101
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11101
Common Vulnerability Exposure (CVE) ID: CVE-2005-2553
14965
http://www.securityfocus.com/bid/14965
19038
http://secunia.com/advisories/19038
FLSA:157459-2
http://www.securityfocus.com/archive/1/428058/100/0/threaded
SUSE-SA:2006:012
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html
http://linux.bkbits.net:8080/linux-2.4/cset%4041dd3455GwQPufrGvBJjcUOXQa3WXA
http://lkml.org/lkml/2005/1/5/245
oval:org.mitre.oval:def:9647
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9647
Common Vulnerability Exposure (CVE) ID: CVE-2005-3274
BugTraq ID: 15528
http://www.securityfocus.com/bid/15528
Debian Security Information: DSA-922 (Google Search)
http://www.securityfocus.com/archive/1/427980/100/0/threaded
http://www.securityfocus.com/archive/1/427981/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://secunia.com/advisories/17826
http://secunia.com/advisories/18684
https://usn.ubuntu.com/219-1/
Common Vulnerability Exposure (CVE) ID: CVE-2005-3275
BugTraq ID: 15531
http://www.securityfocus.com/bid/15531
Debian Security Information: DSA-921 (Google Search)
http://www.securityfocus.com/archive/1/428028/100/0/threaded
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10142
http://www.redhat.com/support/errata/RHSA-2006-0140.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://secunia.com/advisories/17918
http://secunia.com/advisories/18562
http://secunia.com/advisories/19185
http://secunia.com/advisories/19607
SGI Security Advisory: 20060402-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
SuSE Security Announcement: SUSE-SA:2005:068 (Google Search)
http://www.securityfocus.com/archive/1/419522/100/0/threaded
Common Vulnerability Exposure (CVE) ID: CVE-2005-3806
BugTraq ID: 15729
http://www.securityfocus.com/bid/15729
Debian Security Information: DSA-1017 (Google Search)
http://www.debian.org/security/2006/dsa-1017
http://www.mandriva.com/security/advisories?name=MDKSA-2006:018
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9903
http://www.redhat.com/support/errata/RHSA-2006-0101.html
http://secunia.com/advisories/17917
http://secunia.com/advisories/18203
http://secunia.com/advisories/18510
http://secunia.com/advisories/19374
SuSE Security Announcement: SUSE-SA:2005:067 (Google Search)
http://www.securityfocus.com/advisories/9806
https://usn.ubuntu.com/231-1/
Common Vulnerability Exposure (CVE) ID: CVE-2006-0096
BugTraq ID: 16304
http://www.securityfocus.com/bid/16304
http://secunia.com/advisories/18527
https://usn.ubuntu.com/244-1/
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.