Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.840476
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-966-1)
Summary:The remote host is missing an update for the 'linux, linux-ec2, linux-mvl-dove, linux-source-2.6.15, linux-ti-omap' package(s) announced via the USN-966-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux, linux-ec2, linux-mvl-dove, linux-source-2.6.15, linux-ti-omap' package(s) announced via the USN-966-1 advisory.

Vulnerability Insight:
Junjiro R. Okajima discovered that knfsd did not correctly handle
strict overcommit. A local attacker could exploit this to crash knfsd,
leading to a denial of service. (Only Ubuntu 6.06 LTS and 8.04 LTS were
affected.) (CVE-2008-7256, CVE-2010-1643)

Chris Guo, Jukka Taimisto, and Olli Jarva discovered that SCTP did
not correctly handle invalid parameters. A remote attacker could send
specially crafted traffic that could crash the system, leading to a
denial of service. (CVE-2010-1173)

Mario Mikocevic discovered that GFS2 did not correctly handle certain
quota structures. A local attacker could exploit this to crash the
system, leading to a denial of service. (Ubuntu 6.06 LTS was not
affected.) (CVE-2010-1436)

Toshiyuki Okajima discovered that the kernel keyring did not correctly
handle dead keyrings. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2010-1437)

Brad Spengler discovered that Sparc did not correctly implement
non-executable stacks. This made userspace applications vulnerable to
exploits that would have been otherwise blocked due to non-executable
memory protections. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1451)

Dan Rosenberg discovered that the btrfs clone function did not correctly
validate permissions. A local attacker could exploit this to read
sensitive information, leading to a loss of privacy. (Only Ubuntu 9.10
was affected.) (CVE-2010-1636)

Dan Rosenberg discovered that GFS2 set_flags function did not correctly
validate permissions. A local attacker could exploit this to gain
access to files, leading to a loss of privacy and potential privilege
escalation. (Ubuntu 6.06 LTS was not affected.) (CVE-2010-1641)

Shi Weihua discovered that btrfs xattr_set_acl function did not
correctly validate permissions. A local attacker could exploit
this to gain access to files, leading to a loss of privacy and
potential privilege escalation. (Only Ubuntu 9.10 and 10.04 LTS were
affected.) (CVE-2010-2071)

Andre Osterhues discovered that eCryptfs did not correctly calculate
hash values. A local attacker with certain uids could exploit this to
crash the system or potentially gain root privileges. (Ubuntu 6.06 LTS
was not affected.) (CVE-2010-2492)

Affected Software/OS:
'linux, linux-ec2, linux-mvl-dove, linux-source-2.6.15, linux-ti-omap' package(s) on Ubuntu 6.06, Ubuntu 8.04, Ubuntu 9.04, Ubuntu 9.10, Ubuntu 10.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-7256
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
http://www.openwall.com/lists/oss-security/2010/05/27/1
XForce ISS Database: kernel-shmem-dos(59224)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59224
Common Vulnerability Exposure (CVE) ID: CVE-2010-1173
20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
http://www.securityfocus.com/archive/1/516397/100/0/threaded
39830
http://secunia.com/advisories/39830
40218
http://secunia.com/advisories/40218
43315
http://secunia.com/advisories/43315
DSA-2053
http://www.debian.org/security/2010/dsa-2053
MDVSA-2010:198
RHSA-2010:0474
http://www.redhat.com/support/errata/RHSA-2010-0474.html
[netdev] 20100428 Re: [PATCH]: sctp: Fix skb_over_panic resulting from multiple invalid parameter errors (CVE-2010-1173) (v4)
http://article.gmane.org/gmane.linux.network/159531
[oss-security] 20100429 CVE-2010-1173 kernel: skb_over_panic resulting from multiple invalid parameter errors
http://www.openwall.com/lists/oss-security/2010/04/29/1
[oss-security] 20100429 Re: CVE-2010-1173 kernel: skb_over_panic resulting from multiple invalid parameter errors
http://marc.info/?l=oss-security&m=127251068407878&w=2
http://www.openwall.com/lists/oss-security/2010/04/29/6
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=5fa782c2f5ef6c2e4f04d3e228412c9b4a4c8809
http://kbase.redhat.com/faq/docs/DOC-31052
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
https://bugzilla.redhat.com/show_bug.cgi?id=584645
oval:org.mitre.oval:def:11416
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11416
Common Vulnerability Exposure (CVE) ID: CVE-2010-1436
[oss-security] 20100427 CVE request - gfs2 kernel issue
http://www.openwall.com/lists/oss-security/2010/04/27/1
[oss-security] 20100427 Re: CVE request - gfs2 kernel issue
http://www.openwall.com/lists/oss-security/2010/04/28/1
https://bugzilla.redhat.com/show_bug.cgi?id=586006
kernel-gfs2quota-dos(58839)
https://exchange.xforce.ibmcloud.com/vulnerabilities/58839
oval:org.mitre.oval:def:10652
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10652
Common Vulnerability Exposure (CVE) ID: CVE-2010-1437
39719
http://www.securityfocus.com/bid/39719
40645
http://secunia.com/advisories/40645
ADV-2010-1857
http://www.vupen.com/english/advisories/2010/1857
SUSE-SA:2010:031
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html
[linux-kernel] 20100422 [PATCH 0/1][BUG][IMPORTANT] KEYRINGS: find_keyring_by_name() can gain the freed keyring
http://marc.info/?l=linux-kernel&m=127192182917857&w=2
[linux-kernel] 20100430 [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring
http://marc.info/?l=linux-kernel&m=127274294622730&w=2
[linux-kernel] 20100503 Re: [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring
http://marc.info/?l=linux-kernel&m=127292492727029&w=2
[oss-security] 20100427 CVE request - kernel: find_keyring_by_name() can gain the freed keyring
http://www.openwall.com/lists/oss-security/2010/04/27/2
[oss-security] 20100427 Re: CVE request - kernel: find_keyring_by_name() can gain the freed keyring
http://www.openwall.com/lists/oss-security/2010/04/28/2
https://bugzilla.redhat.com/show_bug.cgi?id=585094
https://patchwork.kernel.org/patch/94038/
https://patchwork.kernel.org/patch/94664/
kernel-findkeyringbyname-dos(58254)
https://exchange.xforce.ibmcloud.com/vulnerabilities/58254
oval:org.mitre.oval:def:9715
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9715
Common Vulnerability Exposure (CVE) ID: CVE-2010-1451
[linux-sparc] 20100219 Execution possible in non-executable mappings in recent 2.6 kernels
http://marc.info/?l=linux-sparc&m=126662196902830&w=2
[linux-sparc] 20100219 Re: Execution possible in non-executable mappings in recent 2.6 kernels
http://marc.info/?l=linux-sparc&m=126662159602378&w=2
[oss-security] 20100224 kernel: execution possible in non-executable mappings in recent 2.6 kernels (SPARC only)
http://www.openwall.com/lists/oss-security/2010/02/24/1
[oss-security] 20100505 Re: CVE Request [was Re: kernel: execution possible in non-executable mappings in recent 2.6 kernels (SPARC only)]
http://www.openwall.com/lists/oss-security/2010/05/05/2
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33
Common Vulnerability Exposure (CVE) ID: CVE-2010-1636
[oss-security] 20100518 Re: kernel: btrfs: check for read permission on src file in the clone ioctl
http://www.openwall.com/lists/oss-security/2010/05/18/10
[oss-security] 20100518 kernel: btrfs: check for read permission on src file in the clone ioctl
http://www.openwall.com/lists/oss-security/2010/05/18/2
[oss-security] 20100525 Re: kernel: btrfs: check for read permission on src file in the clone ioctl
http://www.openwall.com/lists/oss-security/2010/05/25/8
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=5dc6416414fb3ec6e2825fd4d20c8bf1d7fe0395
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/579585
https://bugzilla.redhat.com/show_bug.cgi?id=593226
Common Vulnerability Exposure (CVE) ID: CVE-2010-1641
40356
http://www.securityfocus.com/bid/40356
SUSE-SA:2010:033
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html
[cluster-devel] 20100525 [PATCH 3/3] GFS2: Fix permissions checking for setflags ioctl()
https://www.redhat.com/archives/cluster-devel/2010-May/msg00049.html
[oss-security] 20100525 CVE request - kernel: GFS2: The setflags ioctl() doesn't check file ownership
http://www.openwall.com/lists/oss-security/2010/05/25/1
[oss-security] 20100525 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn't check file ownership
http://www.openwall.com/lists/oss-security/2010/05/25/12
[oss-security] 20100526 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn't check file ownership
http://www.openwall.com/lists/oss-security/2010/05/26/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/incr/patch-2.6.34-git9-git10.bz2
https://bugzilla.redhat.com/show_bug.cgi?id=595579
kernel-gfs2-security-bypass(58926)
https://exchange.xforce.ibmcloud.com/vulnerabilities/58926
oval:org.mitre.oval:def:9916
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916
Common Vulnerability Exposure (CVE) ID: CVE-2010-1643
40377
http://www.securityfocus.com/bid/40377
[oss-security] 20100526 CVE request - kernel: nfsd: fix vm overcommit crash
http://www.openwall.com/lists/oss-security/2010/05/26/2
[oss-security] 20100526 Re: CVE request - kernel: nfsd: fix vm overcommit crash
http://www.openwall.com/lists/oss-security/2010/05/26/6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=731572d39fcd3498702eda4600db4c43d51e0b26
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-knfsd-9666
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.28/ChangeLog-2.6.28-rc3
https://bugzilla.redhat.com/show_bug.cgi?id=595970
linux-kernel-knfsd-dos(58957)
https://exchange.xforce.ibmcloud.com/vulnerabilities/58957
Common Vulnerability Exposure (CVE) ID: CVE-2010-2071
[linux-kernel] 20100518 [PATCH] btrfs: should add a permission check for setfacl
http://lkml.org/lkml/2010/5/17/544
[oss-security] 20100611 CVE request - kernel: btrfs: prevent users from setting ACLs on files they do not own
http://www.openwall.com/lists/oss-security/2010/06/11/3
[oss-security] 20100614 Re: CVE request - kernel: btrfs: prevent users from setting ACLs on files they do not own
http://www.openwall.com/lists/oss-security/2010/06/14/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=2f26afba
Common Vulnerability Exposure (CVE) ID: CVE-2010-2492
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
42890
http://secunia.com/advisories/42890
46397
http://secunia.com/advisories/46397
MDVSA-2010:172
http://www.mandriva.com/security/advisories?name=MDVSA-2010:172
RHSA-2010:0723
http://www.redhat.com/support/errata/RHSA-2010-0723.html
RHSA-2011:0007
http://www.redhat.com/support/errata/RHSA-2011-0007.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a6f80fb7b5986fda663d94079d3bba0937a6b6ff
http://support.avaya.com/css/P8/documents/100113326
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=611385
CopyrightCopyright (C) 2010 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.