Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.840180
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-558-1)
Summary:The remote host is missing an update for the 'linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22' package(s) announced via the USN-558-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22' package(s) announced via the USN-558-1 advisory.

Vulnerability Insight:
The minix filesystem did not properly validate certain filesystem values.
If a local attacker could trick the system into attempting to mount a
corrupted minix filesystem, the kernel could be made to hang for long
periods of time, resulting in a denial of service. (CVE-2006-6058)

Certain calculations in the hugetlb code were not correct. A local
attacker could exploit this to cause a kernel panic, leading to a denial
of service. (CVE-2007-4133)

Eric Sesterhenn and Victor Julien discovered that the hop-by-hop IPv6
extended header was not correctly validated. If a system was configured
for IPv6, a remote attacker could send a specially crafted IPv6 packet
and cause the kernel to panic, leading to a denial of service. This
was only vulnerable in Ubuntu 7.04. (CVE-2007-4567)

Permissions were not correctly stored on JFFS2 ACLs. For systems using
ACLs on JFFS2, a local attacker may gain access to private files.
(CVE-2007-4849)

Chris Evans discovered that the 802.11 network stack did not correctly
handle certain QOS frames. A remote attacker on the local wireless network
could send specially crafted packets that would panic the kernel, resulting
in a denial of service. (CVE-2007-4997)

The Philips USB Webcam driver did not correctly handle disconnects.
If a local attacker tricked another user into disconnecting a webcam
unsafely, the kernel could hang or consume CPU resources, leading to
a denial of service. (CVE-2007-5093)

Scott James Remnant discovered that the waitid function could be made
to hang the system. A local attacker could execute a specially crafted
program which would leave the system unresponsive, resulting in a denial
of service. (CVE-2007-5500)

Ilpo Jarvinen discovered that it might be possible for the TCP stack
to panic the kernel when receiving a crafted ACK response. Only Ubuntu
7.10 contained the vulnerable code, and it is believed not to have
been exploitable. (CVE-2007-5501)

When mounting the same remote NFS share to separate local locations, the
first location's mount options would apply to all subsequent mounts of the
same NFS share. In some configurations, this could lead to incorrectly
configured permissions, allowing local users to gain additional access
to the mounted share. ([link moved to references])

Affected Software/OS:
'linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22' package(s) on Ubuntu 6.10, Ubuntu 7.04, Ubuntu 7.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-6058
Debian Security Information: DSA-1436 (Google Search)
http://www.debian.org/security/2007/dsa-1436
Debian Security Information: DSA-1504 (Google Search)
http://www.debian.org/security/2008/dsa-1504
http://www.mandriva.com/security/advisories?name=MDKSA-2007:226
http://www.mandriva.com/security/advisories?name=MDKSA-2007:232
http://www.mandriva.com/security/advisories?name=MDVSA-2008:008
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
http://projects.info-pull.com/mokb/MOKB-17-11-2006.html
http://www.redhat.com/support/errata/RHSA-2007-0672.html
http://secunia.com/advisories/23034
http://secunia.com/advisories/26379
http://secunia.com/advisories/27528
http://secunia.com/advisories/27614
http://secunia.com/advisories/27703
http://secunia.com/advisories/28141
http://secunia.com/advisories/28170
http://secunia.com/advisories/28654
http://secunia.com/advisories/28706
http://secunia.com/advisories/28971
http://secunia.com/advisories/29058
SuSE Security Announcement: SUSE-SA:2007:059 (Google Search)
http://www.novell.com/linux/security/advisories/2007_59_kernel.html
http://www.ubuntu.com/usn/usn-558-1
http://www.ubuntu.com/usn/usn-574-1
http://www.ubuntu.com/usn/usn-578-1
http://www.vupen.com/english/advisories/2006/4613
Common Vulnerability Exposure (CVE) ID: CVE-2007-4133
25904
http://www.securityfocus.com/bid/25904
26994
http://secunia.com/advisories/26994
27322
http://secunia.com/advisories/27322
28170
28971
29058
DSA-1381
http://www.debian.org/security/2007/dsa-1381
DSA-1504
MDKSA-2007:216
http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
MDVSA-2008:008
MDVSA-2008:105
http://www.mandriva.com/security/advisories?name=MDVSA-2008:105
RHSA-2007:0940
http://www.redhat.com/support/errata/RHSA-2007-0940.html
USN-558-1
USN-578-1
http://tree.celinuxforum.org/gitstat/commit-detail.php?commit=856fc29505556cf263f3dcda2533cf3766c14ab6
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.19-rc4
kernel-hugetlbfs-dos(36925)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36925
oval:org.mitre.oval:def:10451
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10451
Common Vulnerability Exposure (CVE) ID: CVE-2007-4567
25505
http://secunia.com/advisories/25505
26943
http://www.securityfocus.com/bid/26943
28706
38015
http://secunia.com/advisories/38015
RHSA-2010:0019
http://www.redhat.com/support/errata/RHSA-2010-0019.html
RHSA-2010:0053
http://www.redhat.com/support/errata/RHSA-2010-0053.html
RHSA-2010:0095
https://rhn.redhat.com/errata/RHSA-2010-0095.html
https://usn.ubuntu.com/558-1/
USN-574-1
http://bugzilla.kernel.org/show_bug.cgi?id=8450
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e76b2b2567b83448c2ee85a896433b96150c92e6
https://bugzilla.redhat.com/show_bug.cgi?id=548641
linux-kernel-ipv6-dos(39171)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39171
oval:org.mitre.oval:def:11083
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11083
oval:org.mitre.oval:def:7474
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7474
Common Vulnerability Exposure (CVE) ID: CVE-2007-4849
BugTraq ID: 25838
http://www.securityfocus.com/bid/25838
Debian Security Information: DSA-1378 (Google Search)
http://www.debian.org/security/2007/dsa-1378
http://lists.infradead.org/pipermail/linux-mtd-cvs/2007-August/005897.html
http://secunia.com/advisories/26978
Common Vulnerability Exposure (CVE) ID: CVE-2007-4997
26337
http://www.securityfocus.com/bid/26337
27555
http://secunia.com/advisories/27555
27614
27824
http://secunia.com/advisories/27824
27912
http://secunia.com/advisories/27912
28033
http://secunia.com/advisories/28033
28162
http://secunia.com/advisories/28162
28806
http://secunia.com/advisories/28806
ADV-2007-3718
http://www.vupen.com/english/advisories/2007/3718
DSA-1428
http://www.debian.org/security/2007/dsa-1428
MDKSA-2007:226
MDKSA-2007:232
RHSA-2007:0993
http://www.redhat.com/support/errata/RHSA-2007-0993.html
RHSA-2007:1104
http://www.redhat.com/support/errata/RHSA-2007-1104.html
SUSE-SA:2007:059
SUSE-SA:2007:064
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
SUSE-SA:2008:006
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
ftp://ftp.kernel.org/pub/linux/kernel/people/bunk/linux-2.6.16.y/testing/ChangeLog-2.6.16.57-rc1
http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git%3Ba=commitdiff%3Bh=04045f98e0457aba7d4e6736f37eed189c48a5f7
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23
kernel-ieee80211-dos(38247)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38247
oval:org.mitre.oval:def:10596
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10596
Common Vulnerability Exposure (CVE) ID: CVE-2007-5093
20070902 Oops in pwc v4l driver
http://marc.info/?l=linux-kernel&m=118873457814808&w=2
20070903 Re: Oops in pwc v4l driver
http://marc.info/?l=linux-kernel&m=118880154122548&w=2
25504
http://www.securityfocus.com/bid/25504
30294
http://secunia.com/advisories/30294
32799
http://secunia.com/advisories/32799
DSA-1503
http://www.debian.org/security/2008/dsa-1503
RHSA-2008:0275
http://www.redhat.com/support/errata/RHSA-2008-0275.html
RHSA-2008:0972
http://rhn.redhat.com/errata/RHSA-2008-0972.html
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.6
oval:org.mitre.oval:def:10494
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10494
Common Vulnerability Exposure (CVE) ID: CVE-2007-5500
26477
http://www.securityfocus.com/bid/26477
27664
http://secunia.com/advisories/27664
27703
27888
http://secunia.com/advisories/27888
27919
http://secunia.com/advisories/27919
27922
http://secunia.com/advisories/27922
28748
http://secunia.com/advisories/28748
29245
http://secunia.com/advisories/29245
30818
http://secunia.com/advisories/30818
30962
http://secunia.com/advisories/30962
ADV-2007-3902
http://www.vupen.com/english/advisories/2007/3902
FEDORA-2007-3751
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00170.html
FEDORA-2007-3837
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00032.html
FEDORA-2007-759
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00302.html
MDVSA-2008:044
http://www.mandriva.com/security/advisories?name=MDVSA-2008:044
MDVSA-2008:112
RHSA-2008:0055
http://rhn.redhat.com/errata/RHSA-2008-0055.html
SUSE-SA:2007:063
http://www.novell.com/linux/security/advisories/2007_63_kernel.html
SUSE-SA:2008:013
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html
SUSE-SA:2008:030
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
SUSE-SA:2008:032
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.23.y.git%3Ba=commitdiff%3Bh=36ef66c5d137b9a31fd8c35d236fb9e26ef74f97
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.8
https://issues.rpath.com/browse/RPL-1965
linux-kernel-waittaskstopped-dos(38547)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38547
oval:org.mitre.oval:def:9868
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9868
Common Vulnerability Exposure (CVE) ID: CVE-2007-5501
26474
http://www.securityfocus.com/bid/26474
[linux-kernel] 20071116 Linux 2.6.23.8
http://lwn.net/Articles/258947/
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=96a2d41a3e495734b63bff4e5dd0112741b93b38
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.24-rc3
linux-kernel-tcpsacktagwritequeue-dos(38548)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38548
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.