English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59177
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-486-1 (linux-source-2.6.17)
Summary:Ubuntu USN-486-1 (linux-source-2.6.17)
Description:
The remote host is missing an update to linux-source-2.6.17
announced via advisory USN-486-1.

A security issue affects the following Ubuntu releases:

Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

For details on the issues addressed with this update, please
visit the referenced security advisories.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.10:
linux-image-2.6.17-12-386 2.6.17.1-12.39
linux-image-2.6.17-12-generic 2.6.17.1-12.39
linux-image-2.6.17-12-hppa32 2.6.17.1-12.39
linux-image-2.6.17-12-hppa64 2.6.17.1-12.39
linux-image-2.6.17-12-itanium 2.6.17.1-12.39
linux-image-2.6.17-12-mckinley 2.6.17.1-12.39
linux-image-2.6.17-12-powerpc 2.6.17.1-12.39
linux-image-2.6.17-12-powerpc-smp 2.6.17.1-12.39
linux-image-2.6.17-12-powerpc64-smp 2.6.17.1-12.39
linux-image-2.6.17-12-server 2.6.17.1-12.39
linux-image-2.6.17-12-server-bigiron 2.6.17.1-12.39
linux-image-2.6.17-12-sparc64 2.6.17.1-12.39
linux-image-2.6.17-12-sparc64-smp 2.6.17.1-12.39

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

ATTENTION: Due to an unavoidable ABI change the Ubuntu 6.10 kernel updates
have been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If you
use linux-restricted-modules, you have to update that package as well to
get modules which work with the new kernel version. Unless you manually
uninstalled the standard kernel metapackages (linux-386, linux-powerpc,
linux-amd64-generic, etc), a standard system upgrade will automatically
perform this as well.

http://www.securityspace.com/smysecure/catid.html?in=USN-486-1

Risk factor : High
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-7203
Debian Security Information: DSA-1504 (Google Search)
http://www.debian.org/security/2008/dsa-1504
http://www.mandriva.com/security/advisories?name=MDKSA-2007:171
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
RedHat Security Advisories: RHSA-2007:0376
https://rhn.redhat.com/errata/RHSA-2007-0376.html
RedHat Security Advisories: RHSA-2007:0488
http://rhn.redhat.com/errata/RHSA-2007-0488.html
SuSE Security Announcement: SUSE-SA:2007:035 (Google Search)
http://www.novell.com/linux/security/advisories/2007_35_kernel.html
SuSE Security Announcement: SUSE-SA:2007:043 (Google Search)
http://www.novell.com/linux/security/advisories/2007_43_kernel.html
http://www.ubuntu.com/usn/usn-486-1
http://www.ubuntu.com/usn/usn-489-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10941
http://www.vupen.com/english/advisories/2007/2209
http://secunia.com/advisories/25682
http://secunia.com/advisories/25700
http://secunia.com/advisories/25683
http://secunia.com/advisories/25838
http://secunia.com/advisories/25961
http://secunia.com/advisories/26133
http://secunia.com/advisories/26139
http://secunia.com/advisories/26289
http://secunia.com/advisories/26620
http://secunia.com/advisories/29058
Common Vulnerability Exposure (CVE) ID: CVE-2007-0005
Bugtraq: 20070309 Buffer Overflow in Linux Drivers for Omnikey CardMan 4040 (CVE-2007-0005) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/462300/100/0/threaded
Bugtraq: 20070615 rPSA-2007-0124-1 kernel xen (Google Search)
http://www.securityfocus.com/archive/1/471457
Debian Security Information: DSA-1286 (Google Search)
http://www.debian.org/security/2007/dsa-1286
http://fedoranews.org/cms/node/2787
http://fedoranews.org/cms/node/2788
http://www.mandriva.com/security/advisories?name=MDKSA-2007:078
http://www.redhat.com/support/errata/RHSA-2007-0099.html
BugTraq ID: 22870
http://www.securityfocus.com/bid/22870
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11238
http://www.vupen.com/english/advisories/2007/0872
http://www.osvdb.org/33023
http://secunia.com/advisories/24436
http://secunia.com/advisories/24518
http://secunia.com/advisories/24777
http://secunia.com/advisories/24901
http://secunia.com/advisories/25078
http://secunia.com/advisories/25691
XForce ISS Database: kernel-cardman4040drivers-bo(32880)
http://xforce.iss.net/xforce/xfdb/32880
Common Vulnerability Exposure (CVE) ID: CVE-2007-1000
http://www.wslabi.com/wabisabilabi/initPublishedBid.do?
http://www.redhat.com/support/errata/RHSA-2007-0169.html
SuSE Security Announcement: SUSE-SA:2007:029 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html
CERT/CC vulnerability note: VU#920689
http://www.kb.cert.org/vuls/id/920689
BugTraq ID: 22904
http://www.securityfocus.com/bid/22904
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10015
http://www.vupen.com/english/advisories/2007/0907
http://www.osvdb.org/33025
http://secunia.com/advisories/25080
http://secunia.com/advisories/25099
http://secunia.com/advisories/24493
Common Vulnerability Exposure (CVE) ID: CVE-2007-1353
Debian Security Information: DSA-1356 (Google Search)
http://www.debian.org/security/2007/dsa-1356
Debian Security Information: DSA-1503 (Google Search)
http://www.debian.org/security/2008/dsa-1503
http://www.redhat.com/support/errata/RHSA-2007-0673.html
http://www.redhat.com/support/errata/RHSA-2007-0672.html
http://www.redhat.com/support/errata/RHSA-2007-0671.html
http://www.ubuntu.com/usn/usn-470-1
BugTraq ID: 23594
http://www.securityfocus.com/bid/23594
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10626
http://www.vupen.com/english/advisories/2007/1495
http://secunia.com/advisories/24976
http://secunia.com/advisories/25596
http://secunia.com/advisories/26379
http://secunia.com/advisories/26478
http://secunia.com/advisories/26450
http://secunia.com/advisories/27528
Common Vulnerability Exposure (CVE) ID: CVE-2007-1861
Bugtraq: 20070508 FLEA-2007-0016-1: kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/467939/30/6690/threaded
Debian Security Information: DSA-1289 (Google Search)
http://www.debian.org/security/2007/dsa-1289
http://www.redhat.com/support/errata/RHSA-2007-0347.html
BugTraq ID: 23677
http://www.securityfocus.com/bid/23677
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11616
http://www.vupen.com/english/advisories/2007/1595
http://secunia.com/advisories/25030
http://secunia.com/advisories/25083
http://secunia.com/advisories/25228
http://secunia.com/advisories/25288
XForce ISS Database: kernel-netlinkfiblookup-dos(34014)
http://xforce.iss.net/xforce/xfdb/34014
Common Vulnerability Exposure (CVE) ID: CVE-2007-2242
http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf
FreeBSD Security Advisory: FreeBSD-SA-07:03.ipv6
http://security.freebsd.org/advisories/FreeBSD-SA-07:03.ipv6.asc
http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
OpenBSD Security Advisory: [3.9] 20070423 022: SECURITY FIX: April 23, 2007
http://openbsd.org/errata39.html#022_route6
OpenBSD Security Advisory: [4.0] 20070423 012: SECURITY FIX: April 23, 2007
http://openbsd.org/errata40.html#012_route6
SuSE Security Announcement: SUSE-SA:2007:051 (Google Search)
http://www.novell.com/linux/security/advisories/2007_51_kernel.html
SuSE Security Announcement: SUSE-SA:2008:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
http://www.ubuntu.com/usn/usn-508-1
CERT/CC vulnerability note: VU#267289
http://www.kb.cert.org/vuls/id/267289
BugTraq ID: 23615
http://www.securityfocus.com/bid/23615
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9574
http://www.vupen.com/english/advisories/2007/1563
http://www.vupen.com/english/advisories/2007/3050
http://www.vupen.com/english/advisories/2007/2270
http://www.securitytracker.com/id?1017949
http://secunia.com/advisories/24978
http://secunia.com/advisories/25033
http://secunia.com/advisories/25068
http://secunia.com/advisories/25770
http://secunia.com/advisories/26651
http://secunia.com/advisories/26703
http://secunia.com/advisories/26664
http://secunia.com/advisories/28806
XForce ISS Database: openbsd-ipv6-type0-dos(33851)
http://xforce.iss.net/xforce/xfdb/33851
Common Vulnerability Exposure (CVE) ID: CVE-2007-2453
http://marc.info/?l=linux-kernel&m=118128610219959&w=2
http://marc.info/?l=linux-kernel&m=118128622431272&w=2
BugTraq ID: 24390
http://www.securityfocus.com/bid/24390
http://osvdb.org/37114
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9960
http://www.vupen.com/english/advisories/2007/2105
http://www.securitytracker.com/id?1018248
XForce ISS Database: kernel-randomnumber-weak-security(34781)
http://xforce.iss.net/xforce/xfdb/34781
Common Vulnerability Exposure (CVE) ID: CVE-2007-2525
SuSE Security Announcement: SUSE-SA:2007:053 (Google Search)
http://www.novell.com/linux/security/advisories/2007_53_kernel.html
http://www.ubuntu.com/usn/usn-510-1
BugTraq ID: 23870
http://www.securityfocus.com/bid/23870
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10594
http://www.vupen.com/english/advisories/2007/1703
http://secunia.com/advisories/25163
http://secunia.com/advisories/27227
XForce ISS Database: kernel-pppoe-dos(34150)
http://xforce.iss.net/xforce/xfdb/34150
Common Vulnerability Exposure (CVE) ID: CVE-2007-2875
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=541
Debian Security Information: DSA-1363 (Google Search)
http://www.debian.org/security/2007/dsa-1363
http://www.redhat.com/support/errata/RHSA-2007-0705.html
BugTraq ID: 24389
http://www.securityfocus.com/bid/24389
http://osvdb.org/37113
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9251
http://www.securitytracker.com/id?1018211
http://secunia.com/advisories/26647
http://secunia.com/advisories/26760
XForce ISS Database: kernel-cpusettasksread-info-disclosure(34779)
http://xforce.iss.net/xforce/xfdb/34779
Common Vulnerability Exposure (CVE) ID: CVE-2007-2876
BugTraq ID: 24376
http://www.securityfocus.com/bid/24376
http://osvdb.org/37112
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10116
XForce ISS Database: kernel-sctpnew-dos(34777)
http://xforce.iss.net/xforce/xfdb/34777
Common Vulnerability Exposure (CVE) ID: CVE-2007-2878
Debian Security Information: DSA-1479 (Google Search)
http://www.debian.org/security/2008/dsa-1479
http://www.redhat.com/support/errata/RHSA-2007-0939.html
BugTraq ID: 24134
http://www.securityfocus.com/bid/24134
http://osvdb.org/35926
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11674
http://www.vupen.com/english/advisories/2007/2023
http://secunia.com/advisories/25505
http://secunia.com/advisories/27436
http://secunia.com/advisories/27747
http://secunia.com/advisories/28626
XForce ISS Database: kernel-vfatioctls-dos(34669)
http://xforce.iss.net/xforce/xfdb/34669
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.