Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57449
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2006:0689
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2006:0689.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the security issues described
below:

* a flaw in the SCTP support that allowed a local user to cause a denial of
service (crash) with a specific SO_LINGER value. (CVE-2006-4535, Important)

* a flaw in the hugepage table support that allowed a local user to cause a
denial of service (crash). (CVE-2005-4811, Important)

* a flaw in the mprotect system call that allowed setting write permission
for a read-only attachment of shared memory. (CVE-2006-2071, Moderate)

* a flaw in HID0[31] (en_attn) register handling on PowerPC 970 systems
that allowed a local user to cause a denial of service. (crash)
(CVE-2006-4093, Moderate)

* a flaw in the perfmon support of Itanium systems that allowed a local
user to cause a denial of service by consuming all file descriptors.
(CVE-2006-3741, Moderate)

* a flaw in the ATM subsystem. On systems with installed ATM hardware and
configured ATM support, a remote user could cause a denial of service
(panic) by accessing socket buffers memory after freeing them.
(CVE-2006-4997, Moderate)

* a flaw in the DVB subsystem. On systems with installed DVB hardware and
configured DVB support, a remote user could cause a denial of service
(panic) by sending a ULE SNDU packet with length of 0. (CVE-2006-4623, Low)

* an information leak in the network subsystem that possibly allowed a
local user to read sensitive data from kernel memory. (CVE-2006-0039, Low)

In addition, two bugfixes for the IPW-2200 wireless driver were included.
The first one ensures that wireless management applications correctly
identify IPW-2200 controlled devices, while the second fix ensures that
DHCP requests using the IPW-2200 operate correctly.

Red Hat would like to thank Olof Johansson, Stephane Eranian and Solar
Designer for reporting issues fixed in this erratum.

All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0689.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : High

CVSS Score:
7.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-4811
BugTraq ID: 20362
http://www.securityfocus.com/bid/20362
Debian Security Information: DSA-1304 (Google Search)
http://www.debian.org/security/2007/dsa-1304
http://marc.info/?l=linux-kernel&m=112323336017157
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976
http://www.redhat.com/support/errata/RHSA-2006-0689.html
http://secunia.com/advisories/22292
http://secunia.com/advisories/22945
http://secunia.com/advisories/25714
Common Vulnerability Exposure (CVE) ID: CVE-2006-0039
18113
http://www.securityfocus.com/bid/18113
20185
http://secunia.com/advisories/20185
20671
http://secunia.com/advisories/20671
20914
http://secunia.com/advisories/20914
20991
http://secunia.com/advisories/20991
21476
http://secunia.com/advisories/21476
22292
22945
25697
http://www.osvdb.org/25697
ADV-2006-1893
http://www.vupen.com/english/advisories/2006/1893
ADV-2006-2554
http://www.vupen.com/english/advisories/2006/2554
DSA-1097
http://www.debian.org/security/2006/dsa-1097
DSA-1103
http://www.debian.org/security/2006/dsa-1103
RHSA-2006:0689
USN-311-1
http://www.ubuntu.com/usn/usn-311-1
http://bugs.gentoo.org/show_bug.cgi?id=133465
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2722971cbe831117686039d5c334f2c0f560be13
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191698
linux-doaddcounters-race-condition(26583)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26583
oval:org.mitre.oval:def:10309
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10309
Common Vulnerability Exposure (CVE) ID: CVE-2006-2071
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
http://www.securityfocus.com/archive/1/451419/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
http://www.securityfocus.com/archive/1/451404/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451417/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451426/100/200/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.osvdb.org/25139
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9978
http://www.redhat.com/support/errata/RHSA-2006-0579.html
http://www.redhat.com/support/errata/RHSA-2006-0580.html
http://www.redhat.com/support/errata/RHSA-2006-0710.html
http://secunia.com/advisories/20157
http://secunia.com/advisories/20716
http://secunia.com/advisories/21035
http://secunia.com/advisories/22497
http://secunia.com/advisories/22875
http://secunia.com/advisories/23064
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1391
http://www.vupen.com/english/advisories/2006/4502
XForce ISS Database: linux-mprotect-security-bypass(26169)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26169
Common Vulnerability Exposure (CVE) ID: CVE-2006-3741
20361
http://www.securityfocus.com/bid/20361
22279
http://secunia.com/advisories/22279
22382
http://secunia.com/advisories/22382
23370
http://secunia.com/advisories/23370
23474
http://secunia.com/advisories/23474
ADV-2006-3937
http://www.vupen.com/english/advisories/2006/3937
DSA-1233
http://www.us.debian.org/security/2006/dsa-1233
MDKSA-2006:182
http://www.mandriva.com/security/advisories?name=MDKSA-2006:182
MDKSA-2007:025
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025
SUSE-SA:2006:079
http://www.novell.com/linux/security/advisories/2006_79_kernel.html
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204360
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b8444d00762703e1b6146fce12ce2684885f8bf6
kernel-sysperfmon-dos(29384)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29384
oval:org.mitre.oval:def:11250
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11250
Common Vulnerability Exposure (CVE) ID: CVE-2006-4093
BugTraq ID: 19615
http://www.securityfocus.com/bid/19615
Debian Security Information: DSA-1184 (Google Search)
http://www.debian.org/security/2006/dsa-1184
Debian Security Information: DSA-1237 (Google Search)
http://www.debian.org/security/2006/dsa-1237
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10666
http://secunia.com/advisories/21563
http://secunia.com/advisories/21695
http://secunia.com/advisories/21847
http://secunia.com/advisories/21934
http://secunia.com/advisories/22093
http://secunia.com/advisories/22148
SuSE Security Announcement: SUSE-SA:2006:057 (Google Search)
http://www.novell.com/linux/security/advisories/2006_57_kernel.html
SuSE Security Announcement: SUSE-SR:2006:021 (Google Search)
http://www.novell.com/linux/security/advisories/2006_21_sr.html
SuSE Security Announcement: SUSE-SR:2006:022 (Google Search)
http://www.novell.com/linux/security/advisories/2006_22_sr.html
http://www.ubuntu.com/usn/usn-346-1
http://www.vupen.com/english/advisories/2006/3330
http://www.vupen.com/english/advisories/2006/3331
Common Vulnerability Exposure (CVE) ID: CVE-2006-4535
BugTraq ID: 20087
http://www.securityfocus.com/bid/20087
Debian Security Information: DSA-1183 (Google Search)
http://www.debian.org/security/2006/dsa-1183
http://www.mail-archive.com/kernel-svn-changes@lists.alioth.debian.org/msg02314.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204460
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10530
http://securitytracker.com/id?1016992
http://secunia.com/advisories/21945
http://secunia.com/advisories/21967
http://secunia.com/advisories/22082
http://www.ubuntu.com/usn/usn-347-1
XForce ISS Database: kernel-sctp-dos(29011)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29011
Common Vulnerability Exposure (CVE) ID: CVE-2006-4623
BugTraq ID: 19939
http://www.securityfocus.com/bid/19939
Bugtraq: 20061017 rPSA-2006-0194-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/448998/100/0/threaded
Bugtraq: 20070615 rPSA-2007-0124-1 kernel xen (Google Search)
http://www.securityfocus.com/archive/1/471457
http://lkml.org/lkml/2006/8/20/278
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9775
http://secunia.com/advisories/21820
http://secunia.com/advisories/22441
http://secunia.com/advisories/25691
http://secunia.com/advisories/26139
SuSE Security Announcement: SUSE-SA:2006:079 (Google Search)
http://www.ubuntu.com/usn/usn-489-1
http://www.vupen.com/english/advisories/2006/3551
Common Vulnerability Exposure (CVE) ID: CVE-2006-4997
BugTraq ID: 20363
http://www.securityfocus.com/bid/20363
Debian Security Information: DSA-1233 (Google Search)
http://www.us.debian.org/security/2006/dsa-1237
http://www.mandriva.com/security/advisories?name=MDKSA-2006:197
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388
http://www.redhat.com/support/errata/RHSA-2007-0012.html
http://www.redhat.com/support/errata/RHSA-2007-0013.html
http://securitytracker.com/id?1017526
http://secunia.com/advisories/22253
http://secunia.com/advisories/22762
http://secunia.com/advisories/23384
http://secunia.com/advisories/23395
http://secunia.com/advisories/23752
http://secunia.com/advisories/23788
http://secunia.com/advisories/24288
http://www.ubuntu.com/usn/usn-395-1
http://www.vupen.com/english/advisories/2006/3999
XForce ISS Database: kernel-clipmkip-dos(29387)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.