English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75096 CVE descriptions
and 39644 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63812
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-752-1 (linux-source-2.6.15)
Summary:Ubuntu USN-752-1 (linux-source-2.6.15)
Description:The remote host is missing an update to linux-source-2.6.15
announced via advisory USN-752-1.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

For details on the issues addressed in this update, please visit
the referenced security advisories.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
linux-image-2.6.15-54-386 2.6.15-54.76
linux-image-2.6.15-54-686 2.6.15-54.76
linux-image-2.6.15-54-amd64-generic 2.6.15-54.76
linux-image-2.6.15-54-amd64-k8 2.6.15-54.76
linux-image-2.6.15-54-amd64-server 2.6.15-54.76
linux-image-2.6.15-54-amd64-xeon 2.6.15-54.76
linux-image-2.6.15-54-hppa32 2.6.15-54.76
linux-image-2.6.15-54-hppa32-smp 2.6.15-54.76
linux-image-2.6.15-54-hppa64 2.6.15-54.76
linux-image-2.6.15-54-hppa64-smp 2.6.15-54.76
linux-image-2.6.15-54-itanium 2.6.15-54.76
linux-image-2.6.15-54-itanium-smp 2.6.15-54.76
linux-image-2.6.15-54-k7 2.6.15-54.76
linux-image-2.6.15-54-mckinley 2.6.15-54.76
linux-image-2.6.15-54-mckinley-smp 2.6.15-54.76
linux-image-2.6.15-54-powerpc 2.6.15-54.76
linux-image-2.6.15-54-powerpc-smp 2.6.15-54.76
linux-image-2.6.15-54-powerpc64-smp 2.6.15-54.76
linux-image-2.6.15-54-server 2.6.15-54.76
linux-image-2.6.15-54-server-bigiron 2.6.15-54.76
linux-image-2.6.15-54-sparc64 2.6.15-54.76
linux-image-2.6.15-54-sparc64-smp 2.6.15-54.76

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-752-1
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-4307
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
http://openwall.com/lists/oss-security/2009/01/13/1
Debian Security Information: DSA-1787 (Google Search)
http://www.debian.org/security/2009/dsa-1787
Debian Security Information: DSA-1794 (Google Search)
http://www.debian.org/security/2009/dsa-1794
http://www.redhat.com/support/errata/RHSA-2009-0451.html
RedHat Security Advisories: RHSA-2009:0459
http://rhn.redhat.com/errata/RHSA-2009-0459.html
RedHat Security Advisories: RHSA-2009:0473
http://rhn.redhat.com/errata/RHSA-2009-0473.html
http://www.ubuntu.com/usn/usn-751-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7728
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9233
http://secunia.com/advisories/34917
http://secunia.com/advisories/34962
http://secunia.com/advisories/34981
http://secunia.com/advisories/35011
http://secunia.com/advisories/35015
http://secunia.com/advisories/37471
http://www.vupen.com/english/advisories/2009/3316
Common Vulnerability Exposure (CVE) ID: CVE-2008-6107
http://marc.info/?l=linux-kernel&m=121071103304610&w=2
BugTraq ID: 33836
http://www.securityfocus.com/bid/33836
http://securitytracker.com/id?1020120
http://secunia.com/advisories/30258
http://www.vupen.com/english/advisories/2008/1655/references
XForce ISS Database: linux-kernel-virtual-address-dos(48710)
http://xforce.iss.net/xforce/xfdb/48710
Common Vulnerability Exposure (CVE) ID: CVE-2009-0028
Bugtraq: 20090516 rPSA-2009-0084-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503610/100/0/threaded
http://scary.beasts.org/security/CESA-2009-002.html
http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-signal-vulnerability.html
Debian Security Information: DSA-1800 (Google Search)
http://www.debian.org/security/2009/dsa-1800
http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
http://www.redhat.com/support/errata/RHSA-2009-0326.html
SuSE Security Announcement: SUSE-SA:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
SuSE Security Announcement: SUSE-SA:2009:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
BugTraq ID: 33906
http://www.securityfocus.com/bid/33906
http://osvdb.org/52204
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11187
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7947
http://secunia.com/advisories/33758
http://secunia.com/advisories/34680
http://secunia.com/advisories/35121
http://secunia.com/advisories/35120
http://secunia.com/advisories/35390
http://secunia.com/advisories/35394
http://secunia.com/advisories/34033
Common Vulnerability Exposure (CVE) ID: CVE-2009-0029
http://marc.info/?l=linux-kernel&m=123155111608910&w=2
Debian Security Information: DSA-1749 (Google Search)
http://www.debian.org/security/2009/dsa-1749
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01045.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
BugTraq ID: 33275
http://www.securityfocus.com/bid/33275
http://secunia.com/advisories/33477
http://secunia.com/advisories/33674
http://secunia.com/advisories/34394
Common Vulnerability Exposure (CVE) ID: CVE-2009-0065
http://www.openwall.com/lists/oss-security/2009/01/05/1
HPdes Security Advisory: HPSBNS02449
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01832118
HPdes Security Advisory: SSSRT090149
http://www.redhat.com/support/errata/RHSA-2009-0053.html
RedHat Security Advisories: RHSA-2009:0264
http://rhn.redhat.com/errata/RHSA-2009-0264.html
http://www.redhat.com/support/errata/RHSA-2009-0331.html
http://www.redhat.com/support/errata/RHSA-2009-1055.html
BugTraq ID: 33113
http://www.securityfocus.com/bid/33113
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10872
http://www.securitytracker.com/id?1022698
http://secunia.com/advisories/34252
http://secunia.com/advisories/34762
http://secunia.com/advisories/35174
http://secunia.com/advisories/36191
http://www.vupen.com/english/advisories/2009/0029
http://secunia.com/advisories/33854
http://secunia.com/advisories/33858
http://www.vupen.com/english/advisories/2009/2193
Common Vulnerability Exposure (CVE) ID: CVE-2009-0322
http://www.redhat.com/support/errata/RHSA-2009-0360.html
BugTraq ID: 33428
http://www.securityfocus.com/bid/33428
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10163
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7734
http://secunia.com/advisories/33656
http://secunia.com/advisories/34502
Common Vulnerability Exposure (CVE) ID: CVE-2009-0675
http://lists.openwall.net/netdev/2009/01/28/90
http://openwall.com/lists/oss-security/2009/02/20/2
http://www.mandriva.com/security/advisories?name=MDVSA-2009:071
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11529
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8685
http://secunia.com/advisories/33938
Common Vulnerability Exposure (CVE) ID: CVE-2009-0676
http://lkml.org/lkml/2009/2/12/123
http://openwall.com/lists/oss-security/2009/02/20/1
http://marc.info/?l=linux-kernel&m=123540732700371&w=2
http://www.openwall.com/lists/oss-security/2009/02/24/1
http://www.openwall.com/lists/oss-security/2009/03/02/6
SuSE Security Announcement: SUSE-SA:2009:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
BugTraq ID: 33846
http://www.securityfocus.com/bid/33846
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11653
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8618
http://secunia.com/advisories/34786
XForce ISS Database: kernel-sock-information-disclosure(48847)
http://xforce.iss.net/xforce/xfdb/48847
Common Vulnerability Exposure (CVE) ID: CVE-2009-0834
http://marc.info/?l=linux-kernel&m=123579056530191&w=2
http://marc.info/?l=linux-kernel&m=123579065130246&w=2
http://marc.info/?l=oss-security&m=123597642832637&w=2
http://scary.beasts.org/security/CESA-2009-001.html
SuSE Security Announcement: SUSE-SA:2009:028 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
BugTraq ID: 33951
http://www.securityfocus.com/bid/33951
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8508
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9600
http://www.securitytracker.com/id?1022153
http://secunia.com/advisories/34084
http://secunia.com/advisories/35185
XForce ISS Database: linux-kernel-auditsyscallentry-sec-bypass(49061)
http://xforce.iss.net/xforce/xfdb/49061
Common Vulnerability Exposure (CVE) ID: CVE-2009-0835
http://marc.info/?l=linux-kernel&m=123579069630311&w=2
http://marc.info/?l=oss-security&m=123597627132485&w=2
http://lkml.org/lkml/2009/2/28/23
http://scary.beasts.org/security/CESA-2009-004.html
http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-seccomp.html
https://bugzilla.redhat.com/show_bug.cgi?id=487255
BugTraq ID: 33948
http://www.securityfocus.com/bid/33948
Common Vulnerability Exposure (CVE) ID: CVE-2009-0859
http://marc.info/?l=git-commits-head&m=123387479500599&w=2
http://marc.info/?l=linux-kernel&m=120428209704324&w=2
http://marc.info/?l=linux-kernel&m=123309645625549&w=2
http://openwall.com/lists/oss-security/2009/03/06/1
BugTraq ID: 34020
http://www.securityfocus.com/bid/34020
XForce ISS Database: linux-kernel-shmgetstat-dos(49229)
http://xforce.iss.net/xforce/xfdb/49229
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.