Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2006:0579

The remote host is missing updates announced in
advisory RHSA-2006:0579.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described

* a flaw in the USB devio handling of device removal that allowed a local
user to cause a denial of service (crash) (CVE-2005-3055, moderate)

* a flaw in ROSE due to missing verification of the ndigis argument of new
routes (CVE-2005-3273, moderate)

* an info leak on AMD-based x86 systems that allowed a local user to
retrieve the floating point exception state of a process run by a different
user (CVE-2006-1056, important)

* a minor info leak in socket name handling in the network code
(CVE-2006-1342, low)

* a minor info leak in socket option handling in the network code
(CVE-2006-1343, low)

* a directory traversal vulnerability in smbfs that allowed a local user to
escape chroot restrictions for an SMB-mounted filesystem via ..\\
sequences (CVE-2006-1864, moderate)

* a flaw in the mprotect system call that allowed to give write permission
to a readonly attachment of shared memory (CVE-2006-2071, moderate)

A performance bug in the NFS implementation that caused clients to
frequently pause when sending TCP segments during heavy write loads was
also addressed.

All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to these updated packages, which contain backported fixes to correct these

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : Medium

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-3055
BugTraq ID: 14955
Debian Security Information: DSA-1017 (Google Search)
SuSE Security Announcement: SUSE-SA:2005:067 (Google Search)
SuSE Security Announcement: SUSE-SA:2005:068 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2005-3273
BugTraq ID: 13886
Debian Security Information: DSA-922 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2006-1056
BugTraq ID: 17600
Bugtraq: 20060419 FreeBSD Security Advisory FreeBSD-SA-06:14.fpu (Google Search)
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
Bugtraq: 20061113 VMSA-2006-0009 - VMware ESX Server 3.0.0 AMD fxsave/restore issue (Google Search)
Debian Security Information: DSA-1097 (Google Search)
Debian Security Information: DSA-1103 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-06:14
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0446 (Google Search)
XForce ISS Database: amd-fpu-information-disclosure(25871)
Common Vulnerability Exposure (CVE) ID: CVE-2006-1342
BugTraq ID: 17203
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2006-1343
Bugtraq: 20060531 rPSA-2006-0087-1 kernel (Google Search)
Debian Security Information: DSA-1184 (Google Search)
XForce ISS Database: linux-sockaddr-memory-leak(25425)
Common Vulnerability Exposure (CVE) ID: CVE-2006-1864
BugTraq ID: 17735
XForce ISS Database: kernel-smbfs-directory-traversal(26137)
Common Vulnerability Exposure (CVE) ID: CVE-2006-2071
XForce ISS Database: linux-mprotect-security-bypass(26169)
CopyrightCopyright (c) 2006 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.