Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55119
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-169-1 (linux-source-2.6.10)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to linux-source-2.6.10
announced via advisory USN-169-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected:

linux-image-2.6.10-5-386
linux-image-2.6.10-5-686
linux-image-2.6.10-5-686-smp
linux-image-2.6.10-5-amd64-generic
linux-image-2.6.10-5-amd64-k8
linux-image-2.6.10-5-amd64-k8-smp
linux-image-2.6.10-5-amd64-xeon
linux-image-2.6.10-5-itanium
linux-image-2.6.10-5-itanium-smp
linux-image-2.6.10-5-k7
linux-image-2.6.10-5-k7-smp
linux-image-2.6.10-5-mckinley
linux-image-2.6.10-5-mckinley-smp
linux-image-2.6.10-5-power3
linux-image-2.6.10-5-power3-smp
linux-image-2.6.10-5-power4
linux-image-2.6.10-5-power4-smp
linux-image-2.6.10-5-powerpc
linux-image-2.6.10-5-powerpc-smp
linux-image-2.6.8.1-5-386
linux-image-2.6.8.1-5-686
linux-image-2.6.8.1-5-686-smp
linux-image-2.6.8.1-5-amd64-generic
linux-image-2.6.8.1-5-amd64-k8
linux-image-2.6.8.1-5-amd64-k8-smp
linux-image-2.6.8.1-5-amd64-xeon
linux-image-2.6.8.1-5-k7
linux-image-2.6.8.1-5-k7-smp
linux-image-2.6.8.1-5-power3
linux-image-2.6.8.1-5-power3-smp
linux-image-2.6.8.1-5-power4
linux-image-2.6.8.1-5-power4-smp
linux-image-2.6.8.1-5-powerpc
linux-image-2.6.8.1-5-powerpc-smp
linux-patch-debian-2.6.8.1
linux-patch-ubuntu-2.6.10

For more details on the issues resolved with the above updates,
please visit the referenced security advisory.

Solution:
The problem can be corrected by upgrading the affected package to
version 2.6.8.1-16.21 (for Ubuntu 4.10), or 2.6.10-34.4 (for Ubuntu
5.04). You need to reboot your computer after a standard system
upgrade to effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-169-1

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-2098
14521
http://www.securityfocus.com/bid/14521
16355
http://secunia.com/advisories/16355/
17073
http://secunia.com/advisories/17073
FLSA:157459-3
http://www.securityfocus.com/archive/1/427980/100/0/threaded
MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
RHSA-2005:514
http://www.redhat.com/support/errata/RHSA-2005-514.html
USN-169-1
https://usn.ubuntu.com/169-1/
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5
oval:org.mitre.oval:def:9638
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9638
Common Vulnerability Exposure (CVE) ID: CVE-2005-2456
BugTraq ID: 14477
http://www.securityfocus.com/bid/14477
Debian Security Information: DSA-921 (Google Search)
http://www.debian.org/security/2005/dsa-921
Debian Security Information: DSA-922 (Google Search)
http://www.debian.org/security/2005/dsa-922
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mail-archive.com/netdev@vger.kernel.org/msg00520.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10858
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://secunia.com/advisories/16298
http://secunia.com/advisories/16500
http://secunia.com/advisories/17002
http://secunia.com/advisories/17826
http://secunia.com/advisories/18056
http://secunia.com/advisories/18059
SuSE Security Announcement: SUSE-SA:2005:050 (Google Search)
http://www.novell.com/linux/security/advisories/2005_50_kernel.html
http://www.vupen.com/english/advisories/2005/1878
XForce ISS Database: linux-kernel-xfrm-dos(21710)
https://exchange.xforce.ibmcloud.com/vulnerabilities/21710
Common Vulnerability Exposure (CVE) ID: CVE-2005-2457
BugTraq ID: 14614
http://www.securityfocus.com/bid/14614
Debian Security Information: DSA-1017 (Google Search)
http://www.debian.org/security/2006/dsa-1017
Debian Security Information: DSA-1018 (Google Search)
http://www.debian.org/security/2006/dsa-1018
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://secunia.com/advisories/17918
http://secunia.com/advisories/19369
http://secunia.com/advisories/19374
SuSE Security Announcement: SUSE-SA:2005:068 (Google Search)
http://www.securityfocus.com/archive/1/419522/100/0/threaded
Common Vulnerability Exposure (CVE) ID: CVE-2005-2458
BugTraq ID: 14719
http://www.securityfocus.com/bid/14719
http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://www.securityfocus.com/archive/1/428058/100/0/threaded
http://sources.redhat.com/ml/bug-gnu-utils/1999-06/msg00183.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10785
http://www.redhat.com/support/errata/RHSA-2006-0101.html
http://www.redhat.com/support/errata/RHSA-2006-0144.html
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://secunia.com/advisories/18510
http://secunia.com/advisories/18684
http://secunia.com/advisories/19252
Common Vulnerability Exposure (CVE) ID: CVE-2005-2459
BugTraq ID: 14720
http://www.securityfocus.com/bid/14720
http://bugs.gentoo.org/show_bug.cgi?id=94584
Common Vulnerability Exposure (CVE) ID: CVE-2005-2548
BugTraq ID: 14611
http://www.securityfocus.com/bid/14611
Common Vulnerability Exposure (CVE) ID: CVE-2005-2555
BugTraq ID: 14609
http://www.securityfocus.com/bid/14609
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10444
Common Vulnerability Exposure (CVE) ID: CVE-2005-2099
1014644
http://securitytracker.com/id?1014644
14517
http://www.securityfocus.com/bid/14517
oval:org.mitre.oval:def:9079
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9079
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.