Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.840307
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-574-1)
Summary:The remote host is missing an update for the 'linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22' package(s) announced via the USN-574-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22' package(s) announced via the USN-574-1 advisory.

Vulnerability Insight:
The minix filesystem did not properly validate certain filesystem
values. If a local attacker could trick the system into attempting
to mount a corrupted minix filesystem, the kernel could be made to
hang for long periods of time, resulting in a denial of service.
This was only vulnerable in Ubuntu 7.04 and 7.10. (CVE-2006-6058)

The signal handling on PowerPC systems using HTX allowed local users
to cause a denial of service via floating point corruption. This was
only vulnerable in Ubuntu 6.10 and 7.04. (CVE-2007-3107)

The Linux kernel did not properly validate the hop-by-hop IPv6
extended header. Remote attackers could send a crafted IPv6 packet
and cause a denial of service via kernel panic. This was only
vulnerable in Ubuntu 7.04. (CVE-2007-4567)

The JFFS2 filesystem with ACL support enabled did not properly store
permissions during inode creation and ACL setting. Local users could
possibly access restricted files after a remount. This was only
vulnerable in Ubuntu 7.04 and 7.10. (CVE-2007-4849)

Chris Evans discovered an issue with certain drivers that use the
ieee80211_rx function. Remote attackers could send a crafted 802.11
frame and cause a denial of service via crash. This was only
vulnerable in Ubuntu 7.04 and 7.10. (CVE-2007-4997)

Alex Smith discovered an issue with the pwc driver for certain webcam
devices. A local user with physical access to the system could remove
the device while a userspace application had it open and cause the USB
subsystem to block. This was only vulnerable in Ubuntu 7.04.
(CVE-2007-5093)

Scott James Remnant discovered a coding error in ptrace. Local users
could exploit this and cause the kernel to enter an infinite loop.
This was only vulnerable in Ubuntu 7.04 and 7.10. (CVE-2007-5500)

It was discovered that the Linux kernel could dereference a NULL
pointer when processing certain IPv4 TCP packets. A remote attacker
could send a crafted TCP ACK response and cause a denial of service
via crash. This was only vulnerable in Ubuntu 7.10. (CVE-2007-5501)

Warren Togami discovered that the hrtimer subsystem did not properly
check for large relative timeouts. A local user could exploit this and
cause a denial of service via soft lockup. (CVE-2007-5966)

Venustech AD-LAB discovered a buffer overflow in the isdn net
subsystem. This issue is exploitable by local users via crafted input
to the isdn_ioctl function. (CVE-2007-6063)

It was discovered that the isdn subsystem did not properly check for
NULL termination when performing ioctl handling. A local user could
exploit this to cause a denial of service. (CVE-2007-6151)

Blake Frantz discovered that when a root process overwrote an existing
core file, the resulting core file retained the previous core file's
ownership. Local users could exploit this to gain access to sensitive
information. (CVE-2007-6206)

Hugh Dickins discovered the when using the tmpfs filesystem, under
rare ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22' package(s) on Ubuntu 6.10, Ubuntu 7.04, Ubuntu 7.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-6058
Debian Security Information: DSA-1436 (Google Search)
http://www.debian.org/security/2007/dsa-1436
Debian Security Information: DSA-1504 (Google Search)
http://www.debian.org/security/2008/dsa-1504
http://www.mandriva.com/security/advisories?name=MDKSA-2007:226
http://www.mandriva.com/security/advisories?name=MDKSA-2007:232
http://www.mandriva.com/security/advisories?name=MDVSA-2008:008
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
http://projects.info-pull.com/mokb/MOKB-17-11-2006.html
http://www.redhat.com/support/errata/RHSA-2007-0672.html
http://secunia.com/advisories/23034
http://secunia.com/advisories/26379
http://secunia.com/advisories/27528
http://secunia.com/advisories/27614
http://secunia.com/advisories/27703
http://secunia.com/advisories/28141
http://secunia.com/advisories/28170
http://secunia.com/advisories/28654
http://secunia.com/advisories/28706
http://secunia.com/advisories/28971
http://secunia.com/advisories/29058
SuSE Security Announcement: SUSE-SA:2007:059 (Google Search)
http://www.novell.com/linux/security/advisories/2007_59_kernel.html
http://www.ubuntu.com/usn/usn-558-1
http://www.ubuntu.com/usn/usn-574-1
http://www.ubuntu.com/usn/usn-578-1
http://www.vupen.com/english/advisories/2006/4613
Common Vulnerability Exposure (CVE) ID: CVE-2007-3107
1018347
http://www.securitytracker.com/id?1018347
24845
http://www.securityfocus.com/bid/24845
25955
http://secunia.com/advisories/25955
25963
http://secunia.com/advisories/25963
26664
http://secunia.com/advisories/26664
27227
http://secunia.com/advisories/27227
28706
37118
http://osvdb.org/37118
RHSA-2007:0595
http://www.redhat.com/support/errata/RHSA-2007-0595.html
SUSE-SA:2007:051
http://www.novell.com/linux/security/advisories/2007_51_kernel.html
SUSE-SA:2007:053
http://www.novell.com/linux/security/advisories/2007_53_kernel.html
USN-574-1
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245580
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
kernel-htx-signal-dos(35383)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35383
oval:org.mitre.oval:def:9936
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9936
Common Vulnerability Exposure (CVE) ID: CVE-2007-4567
25505
http://secunia.com/advisories/25505
26943
http://www.securityfocus.com/bid/26943
28170
38015
http://secunia.com/advisories/38015
RHSA-2010:0019
http://www.redhat.com/support/errata/RHSA-2010-0019.html
RHSA-2010:0053
http://www.redhat.com/support/errata/RHSA-2010-0053.html
RHSA-2010:0095
https://rhn.redhat.com/errata/RHSA-2010-0095.html
USN-558-1
https://usn.ubuntu.com/558-1/
http://bugzilla.kernel.org/show_bug.cgi?id=8450
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e76b2b2567b83448c2ee85a896433b96150c92e6
https://bugzilla.redhat.com/show_bug.cgi?id=548641
linux-kernel-ipv6-dos(39171)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39171
oval:org.mitre.oval:def:11083
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11083
oval:org.mitre.oval:def:7474
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7474
Common Vulnerability Exposure (CVE) ID: CVE-2007-4849
BugTraq ID: 25838
http://www.securityfocus.com/bid/25838
Debian Security Information: DSA-1378 (Google Search)
http://www.debian.org/security/2007/dsa-1378
http://lists.infradead.org/pipermail/linux-mtd-cvs/2007-August/005897.html
http://secunia.com/advisories/26978
Common Vulnerability Exposure (CVE) ID: CVE-2007-4997
26337
http://www.securityfocus.com/bid/26337
27555
http://secunia.com/advisories/27555
27614
27824
http://secunia.com/advisories/27824
27912
http://secunia.com/advisories/27912
28033
http://secunia.com/advisories/28033
28162
http://secunia.com/advisories/28162
28806
http://secunia.com/advisories/28806
28971
ADV-2007-3718
http://www.vupen.com/english/advisories/2007/3718
DSA-1428
http://www.debian.org/security/2007/dsa-1428
MDKSA-2007:226
MDKSA-2007:232
MDVSA-2008:008
MDVSA-2008:105
http://www.mandriva.com/security/advisories?name=MDVSA-2008:105
RHSA-2007:0993
http://www.redhat.com/support/errata/RHSA-2007-0993.html
RHSA-2007:1104
http://www.redhat.com/support/errata/RHSA-2007-1104.html
SUSE-SA:2007:059
SUSE-SA:2007:064
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
SUSE-SA:2008:006
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
USN-578-1
ftp://ftp.kernel.org/pub/linux/kernel/people/bunk/linux-2.6.16.y/testing/ChangeLog-2.6.16.57-rc1
http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git%3Ba=commitdiff%3Bh=04045f98e0457aba7d4e6736f37eed189c48a5f7
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23
kernel-ieee80211-dos(38247)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38247
oval:org.mitre.oval:def:10596
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10596
Common Vulnerability Exposure (CVE) ID: CVE-2007-5093
20070902 Oops in pwc v4l driver
http://marc.info/?l=linux-kernel&m=118873457814808&w=2
20070903 Re: Oops in pwc v4l driver
http://marc.info/?l=linux-kernel&m=118880154122548&w=2
25504
http://www.securityfocus.com/bid/25504
26994
http://secunia.com/advisories/26994
29058
30294
http://secunia.com/advisories/30294
32799
http://secunia.com/advisories/32799
DSA-1381
http://www.debian.org/security/2007/dsa-1381
DSA-1503
http://www.debian.org/security/2008/dsa-1503
DSA-1504
RHSA-2008:0275
http://www.redhat.com/support/errata/RHSA-2008-0275.html
RHSA-2008:0972
http://rhn.redhat.com/errata/RHSA-2008-0972.html
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.6
oval:org.mitre.oval:def:10494
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10494
Common Vulnerability Exposure (CVE) ID: CVE-2007-5500
26477
http://www.securityfocus.com/bid/26477
27664
http://secunia.com/advisories/27664
27703
27888
http://secunia.com/advisories/27888
27919
http://secunia.com/advisories/27919
27922
http://secunia.com/advisories/27922
28748
http://secunia.com/advisories/28748
29245
http://secunia.com/advisories/29245
30818
http://secunia.com/advisories/30818
30962
http://secunia.com/advisories/30962
ADV-2007-3902
http://www.vupen.com/english/advisories/2007/3902
FEDORA-2007-3751
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00170.html
FEDORA-2007-3837
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00032.html
FEDORA-2007-759
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00302.html
MDVSA-2008:044
http://www.mandriva.com/security/advisories?name=MDVSA-2008:044
MDVSA-2008:112
RHSA-2008:0055
http://rhn.redhat.com/errata/RHSA-2008-0055.html
SUSE-SA:2007:063
http://www.novell.com/linux/security/advisories/2007_63_kernel.html
SUSE-SA:2008:013
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html
SUSE-SA:2008:030
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
SUSE-SA:2008:032
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.23.y.git%3Ba=commitdiff%3Bh=36ef66c5d137b9a31fd8c35d236fb9e26ef74f97
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.8
https://issues.rpath.com/browse/RPL-1965
linux-kernel-waittaskstopped-dos(38547)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38547
oval:org.mitre.oval:def:9868
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9868
Common Vulnerability Exposure (CVE) ID: CVE-2007-5501
26474
http://www.securityfocus.com/bid/26474
[linux-kernel] 20071116 Linux 2.6.23.8
http://lwn.net/Articles/258947/
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=96a2d41a3e495734b63bff4e5dd0112741b93b38
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.24-rc3
linux-kernel-tcpsacktagwritequeue-dos(38548)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38548
Common Vulnerability Exposure (CVE) ID: CVE-2007-5966
20071218 rPSA-2007-0269-1 kernel
http://www.securityfocus.com/archive/1/485282/100/0/threaded
20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
http://www.securityfocus.com/archive/1/507985/100/0/threaded
26880
http://www.securityfocus.com/bid/26880
28088
http://secunia.com/advisories/28088
28105
http://secunia.com/advisories/28105
28141
31628
http://secunia.com/advisories/31628
36131
http://secunia.com/advisories/36131
37471
http://secunia.com/advisories/37471
ADV-2007-4225
http://www.vupen.com/english/advisories/2007/4225
ADV-2009-3316
http://www.vupen.com/english/advisories/2009/3316
DSA-1436
RHSA-2008:0585
http://www.redhat.com/support/errata/RHSA-2008-0585.html
RHSA-2009:1193
http://www.redhat.com/support/errata/RHSA-2009-1193.html
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.10
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
https://issues.rpath.com/browse/RPL-2038
oval:org.mitre.oval:def:10774
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10774
oval:org.mitre.oval:def:8125
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8125
Common Vulnerability Exposure (CVE) ID: CVE-2007-6063
BugTraq ID: 26605
http://www.securityfocus.com/bid/26605
Debian Security Information: DSA-1503 (Google Search)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6514
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9846
RedHat Security Advisories: RHSA-2008:0055
http://www.redhat.com/support/errata/RHSA-2008-0154.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
http://www.redhat.com/support/errata/RHSA-2008-0973.html
http://secunia.com/advisories/27842
http://secunia.com/advisories/29236
http://secunia.com/advisories/33201
http://secunia.com/advisories/33280
SuSE Security Announcement: SUSE-SA:2007:064 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:006 (Google Search)
http://www.vupen.com/english/advisories/2007/4046
Common Vulnerability Exposure (CVE) ID: CVE-2007-6151
BugTraq ID: 27497
http://www.securityfocus.com/bid/27497
Debian Security Information: DSA-1479 (Google Search)
http://www.debian.org/security/2008/dsa-1479
http://www.mandriva.com/security/advisories?name=MDVSA-2008:086
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10971
http://www.redhat.com/support/errata/RHSA-2008-0211.html
http://secunia.com/advisories/28626
http://secunia.com/advisories/28889
http://secunia.com/advisories/29570
http://secunia.com/advisories/30110
http://secunia.com/advisories/31246
SuSE Security Announcement: SUSE-SA:2008:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
SuSE Security Announcement: SUSE-SA:2008:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
SuSE Security Announcement: SUSE-SA:2008:032 (Google Search)
http://www.vupen.com/english/advisories/2008/2222/references
Common Vulnerability Exposure (CVE) ID: CVE-2007-6206
BugTraq ID: 26701
http://www.securityfocus.com/bid/26701
Bugtraq: 20080208 rPSA-2008-0048-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/487808/100/0/threaded
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10719
http://www.redhat.com/support/errata/RHSA-2008-0089.html
http://secunia.com/advisories/27908
http://secunia.com/advisories/28643
http://secunia.com/advisories/28826
SuSE Security Announcement: SUSE-SA:2008:030 (Google Search)
http://www.vupen.com/english/advisories/2007/4090
XForce ISS Database: kernel-core-dump-information-disclosure(38841)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38841
Common Vulnerability Exposure (CVE) ID: CVE-2007-6417
BugTraq ID: 27694
http://www.securityfocus.com/bid/27694
http://marc.info/?l=linux-kernel&m=119627664702379&w=2
http://marc.info/?l=linux-kernel&m=119743651829347&w=2
http://marc.info/?l=linux-kernel&m=119769771026243&w=2
http://osvdb.org/44120
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8920
http://www.redhat.com/support/errata/RHSA-2008-0885.html
http://secunia.com/advisories/32023
Common Vulnerability Exposure (CVE) ID: CVE-2008-0001
1019289
http://securitytracker.com/id?1019289
20080117 rPSA-2008-0021-1 kernel
http://www.securityfocus.com/archive/1/486485/100/0/threaded
27280
http://www.securityfocus.com/bid/27280
28485
http://secunia.com/advisories/28485
28558
http://secunia.com/advisories/28558
28626
28628
http://secunia.com/advisories/28628
28643
28664
http://secunia.com/advisories/28664
ADV-2008-0151
http://www.vupen.com/english/advisories/2008/0151
DSA-1479
FEDORA-2008-0748
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html
RHSA-2008:0089
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=974a9f0b47da74e28f68b9c8645c3786aa5ace1a
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.16
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0021
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.14
https://issues.rpath.com/browse/RPL-2146
linux-directory-security-bypass(39672)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39672
oval:org.mitre.oval:def:9709
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9709
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.