English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.60392
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-578-1 (linux-source-2.6.15)
Summary:Ubuntu USN-578-1 (linux-source-2.6.15)
Description:
The remote host is missing an update to linux-source-2.6.15
announced via advisory USN-578-1.

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.


Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
linux-image-2.6.15-51-386 2.6.15-51.66
linux-image-2.6.15-51-686 2.6.15-51.66
linux-image-2.6.15-51-amd64-generic 2.6.15-51.66
linux-image-2.6.15-51-amd64-k8 2.6.15-51.66
linux-image-2.6.15-51-amd64-server 2.6.15-51.66
linux-image-2.6.15-51-amd64-xeon 2.6.15-51.66
linux-image-2.6.15-51-hppa32 2.6.15-51.66
linux-image-2.6.15-51-hppa32-smp 2.6.15-51.66
linux-image-2.6.15-51-hppa64 2.6.15-51.66
linux-image-2.6.15-51-hppa64-smp 2.6.15-51.66
linux-image-2.6.15-51-itanium 2.6.15-51.66
linux-image-2.6.15-51-itanium-smp 2.6.15-51.66
linux-image-2.6.15-51-k7 2.6.15-51.66
linux-image-2.6.15-51-mckinley 2.6.15-51.66
linux-image-2.6.15-51-mckinley-smp 2.6.15-51.66
linux-image-2.6.15-51-powerpc 2.6.15-51.66
linux-image-2.6.15-51-powerpc-smp 2.6.15-51.66
linux-image-2.6.15-51-powerpc64-smp 2.6.15-51.66
linux-image-2.6.15-51-server 2.6.15-51.66
linux-image-2.6.15-51-server-bigiron 2.6.15-51.66
linux-image-2.6.15-51-sparc64 2.6.15-51.66
linux-image-2.6.15-51-sparc64-smp 2.6.15-51.66

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-578-1

Risk factor : High
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-6058
http://projects.info-pull.com/mokb/MOKB-17-11-2006.html
Debian Security Information: DSA-1436 (Google Search)
http://www.debian.org/security/2007/dsa-1436
Debian Security Information: DSA-1504 (Google Search)
http://www.debian.org/security/2008/dsa-1504
http://www.mandriva.com/security/advisories?name=MDKSA-2007:226
http://www.mandriva.com/security/advisories?name=MDKSA-2007:232
http://www.mandriva.com/security/advisories?name=MDVSA-2008:008
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
http://www.redhat.com/support/errata/RHSA-2007-0672.html
SuSE Security Announcement: SUSE-SA:2007:059 (Google Search)
http://www.novell.com/linux/security/advisories/2007_59_kernel.html
http://www.ubuntu.com/usn/usn-574-1
http://www.ubuntu.com/usn/usn-558-1
http://www.ubuntu.com/usn/usn-578-1
http://www.vupen.com/english/advisories/2006/4613
http://secunia.com/advisories/23034
http://secunia.com/advisories/26379
http://secunia.com/advisories/27528
http://secunia.com/advisories/27614
http://secunia.com/advisories/27703
http://secunia.com/advisories/28141
http://secunia.com/advisories/28654
http://secunia.com/advisories/28706
http://secunia.com/advisories/28170
http://secunia.com/advisories/28971
http://secunia.com/advisories/29058
Common Vulnerability Exposure (CVE) ID: CVE-2006-7229
BugTraq ID: 26511
http://www.securityfocus.com/bid/26511
Common Vulnerability Exposure (CVE) ID: CVE-2007-4133
Debian Security Information: DSA-1381 (Google Search)
http://www.debian.org/security/2007/dsa-1381
http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
http://www.mandriva.com/security/advisories?name=MDVSA-2008:105
http://www.redhat.com/support/errata/RHSA-2007-0940.html
BugTraq ID: 25904
http://www.securityfocus.com/bid/25904
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10451
http://secunia.com/advisories/27322
http://secunia.com/advisories/26994
XForce ISS Database: kernel-hugetlbfs-dos(36925)
http://xforce.iss.net/xforce/xfdb/36925
Common Vulnerability Exposure (CVE) ID: CVE-2007-4997
http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git;a=commitdiff;h=04045f98e0457aba7d4e6736f37eed189c48a5f7
Debian Security Information: DSA-1428 (Google Search)
http://www.debian.org/security/2007/dsa-1428
http://www.redhat.com/support/errata/RHSA-2007-0993.html
http://www.redhat.com/support/errata/RHSA-2007-1104.html
SuSE Security Announcement: SUSE-SA:2007:064 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
SuSE Security Announcement: SUSE-SA:2008:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
BugTraq ID: 26337
http://www.securityfocus.com/bid/26337
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10596
http://www.vupen.com/english/advisories/2007/3718
http://secunia.com/advisories/27555
http://secunia.com/advisories/27824
http://secunia.com/advisories/27912
http://secunia.com/advisories/28033
http://secunia.com/advisories/28162
http://secunia.com/advisories/28806
XForce ISS Database: kernel-ieee80211-dos(38247)
http://xforce.iss.net/xforce/xfdb/38247
Common Vulnerability Exposure (CVE) ID: CVE-2007-5093
http://marc.info/?l=linux-kernel&m=118873457814808&w=2
http://marc.info/?l=linux-kernel&m=118880154122548&w=2
Debian Security Information: DSA-1503 (Google Search)
http://www.debian.org/security/2008/dsa-1503
http://www.redhat.com/support/errata/RHSA-2008-0275.html
RedHat Security Advisories: RHSA-2008:0972
http://rhn.redhat.com/errata/RHSA-2008-0972.html
BugTraq ID: 25504
http://www.securityfocus.com/bid/25504
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10494
http://secunia.com/advisories/30294
http://secunia.com/advisories/32799
Common Vulnerability Exposure (CVE) ID: CVE-2007-5500
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00170.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00032.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00302.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:044
RedHat Security Advisories: RHSA-2008:0055
http://rhn.redhat.com/errata/RHSA-2008-0055.html
SuSE Security Announcement: SUSE-SA:2007:063 (Google Search)
http://www.novell.com/linux/security/advisories/2007_63_kernel.html
SuSE Security Announcement: SUSE-SA:2008:013 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html
SuSE Security Announcement: SUSE-SA:2008:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
SuSE Security Announcement: SUSE-SA:2008:032 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
BugTraq ID: 26477
http://www.securityfocus.com/bid/26477
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9868
http://www.vupen.com/english/advisories/2007/3902
http://secunia.com/advisories/27664
http://secunia.com/advisories/27888
http://secunia.com/advisories/27919
http://secunia.com/advisories/27922
http://secunia.com/advisories/28748
http://secunia.com/advisories/29245
http://secunia.com/advisories/30818
http://secunia.com/advisories/30962
XForce ISS Database: linux-kernel-waittaskstopped-dos(38547)
http://xforce.iss.net/xforce/xfdb/38547
Common Vulnerability Exposure (CVE) ID: CVE-2007-6063
http://www.redhat.com/support/errata/RHSA-2008-0154.html
http://www.redhat.com/support/errata/RHSA-2008-0973.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
BugTraq ID: 26605
http://www.securityfocus.com/bid/26605
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6514
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9846
http://www.vupen.com/english/advisories/2007/4046
http://secunia.com/advisories/27842
http://secunia.com/advisories/29236
http://secunia.com/advisories/33201
http://secunia.com/advisories/33280
Common Vulnerability Exposure (CVE) ID: CVE-2007-6151
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
Debian Security Information: DSA-1479 (Google Search)
http://www.debian.org/security/2008/dsa-1479
http://www.mandriva.com/security/advisories?name=MDVSA-2008:086
http://www.redhat.com/support/errata/RHSA-2008-0211.html
SuSE Security Announcement: SUSE-SA:2008:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
SuSE Security Announcement: SUSE-SA:2008:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
BugTraq ID: 27497
http://www.securityfocus.com/bid/27497
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10971
http://www.vupen.com/english/advisories/2008/2222/references
http://secunia.com/advisories/28626
http://secunia.com/advisories/28889
http://secunia.com/advisories/29570
http://secunia.com/advisories/31246
http://secunia.com/advisories/30110
Common Vulnerability Exposure (CVE) ID: CVE-2007-6206
Bugtraq: 20080208 rPSA-2008-0048-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/487808/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2008-0089.html
BugTraq ID: 26701
http://www.securityfocus.com/bid/26701
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10719
http://www.vupen.com/english/advisories/2007/4090
http://secunia.com/advisories/27908
http://secunia.com/advisories/28826
http://secunia.com/advisories/28643
XForce ISS Database: kernel-core-dump-information-disclosure(38841)
http://xforce.iss.net/xforce/xfdb/38841
Common Vulnerability Exposure (CVE) ID: CVE-2007-6417
http://marc.info/?l=linux-kernel&m=119627664702379&w=2
http://marc.info/?l=linux-kernel&m=119743651829347&w=2
http://marc.info/?l=linux-kernel&m=119769771026243&w=2
http://www.redhat.com/support/errata/RHSA-2008-0885.html
BugTraq ID: 27694
http://www.securityfocus.com/bid/27694
http://osvdb.org/44120
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8920
http://secunia.com/advisories/32023
Common Vulnerability Exposure (CVE) ID: CVE-2008-0001
Bugtraq: 20080117 rPSA-2008-0021-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/486485/100/0/threaded
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html
BugTraq ID: 27280
http://www.securityfocus.com/bid/27280
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9709
http://www.vupen.com/english/advisories/2008/0151
http://securitytracker.com/id?1019289
http://secunia.com/advisories/28485
http://secunia.com/advisories/28558
http://secunia.com/advisories/28628
http://secunia.com/advisories/28664
XForce ISS Database: linux-directory-security-bypass(39672)
http://xforce.iss.net/xforce/xfdb/39672
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.