Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2006.302.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-302-1)
Summary:The remote host is missing an update for the 'linux-meta, linux-restricted-modules-2.6.15, linux-source-2.6.10, linux-source-2.6.12, linux-source-2.6.15' package(s) announced via the USN-302-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-meta, linux-restricted-modules-2.6.15, linux-source-2.6.10, linux-source-2.6.12, linux-source-2.6.15' package(s) announced via the USN-302-1 advisory.

Vulnerability Insight:
An integer overflow was discovered in the do_replace() function. A
local user process with the CAP_NET_ADMIN capability could exploit
this to execute arbitrary commands with full root privileges.
However, none of Ubuntu's supported packages use this capability with
any non-root user, so this only affects you if you use some third
party software like the OpenVZ virtualization system. (CVE-2006-0038)

On EMT64 CPUs, the kernel did not properly handle uncanonical return
addresses. A local user could exploit this to trigger a kernel crash.
(CVE-2006-0744)

Al Viro discovered a local Denial of Service in the sysfs write buffer
handling. By writing a block with a length exactly equal to the
processor's page size to any writable file in /sys, a local attacker
could cause a kernel crash. (CVE-2006-1055)

Jan Beulich discovered an information leak in the handling of
registers for the numeric coprocessor when running on AMD processors.
This allowed processes to see the coprocessor execution state of
other processes, which could reveal sensitive data in the case of
cryptographic computations. (CVE-2006-1056)

Marcel Holtmann discovered that the sys_add_key() did not check that
a new user key is added to a proper keyring. By attempting to add a
key to a normal user key (which is not a keyring), a local attacker
could exploit this to crash the kernel. (CVE-2006-1522)

Ingo Molnar discovered that the SCTP protocol connection tracking
module in netfilter got stuck in an infinite loop on certain empty
packet chunks. A remote attacker could exploit this to cause the
computer to hang. (CVE-2006-1527)

The SCSI I/O driver did not correctly handle the VM_IO flag for memory
mapped pages used for data transfer. A local user could exploit this
to cause a kernel crash. (CVE-2006-1528)

The choose_new_parent() contained obsolete debugging code. A local
user could exploit this to cause a kernel crash. (CVE-2006-1855)

Kostik Belousov discovered that the readv() and writev() functions did
not query LSM modules for access permission. This could be exploited
to circumvent access restrictions defined by LSM modules such as
SELinux or AppArmor. (CVE-2006-1856)

The SCTP driver did not properly verify certain parameters when
receiving a HB-ACK chunk. By sending a specially crafted packet to an
SCTP socket, a remote attacker could exploit this to trigger a buffer
overflow, which could lead to a crash or possibly even arbitrary code
execution. (CVE-2006-1857)

The sctp_walk_params() function in the SCTP driver incorrectly used
rounded values for bounds checking instead of the precise values. By
sending a specially crafted packet to an SCTP socket, a remote
attacker could exploit this to crash the kernel. (CVE-2006-1858)

Bjoern Steinbrink reported a memory leak in the __setlease() function.
A local attacker could exploit this to exhaust kernel memory and
render the computer unusable (Denial of Service). ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'linux-meta, linux-restricted-modules-2.6.15, linux-source-2.6.10, linux-source-2.6.12, linux-source-2.6.15' package(s) on Ubuntu 5.04, Ubuntu 5.10, Ubuntu 6.06.

Solution:
Please install the updated package(s).

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-0038
17178
http://www.securityfocus.com/bid/17178
19330
http://secunia.com/advisories/19330
20671
http://secunia.com/advisories/20671
20716
http://secunia.com/advisories/20716
20914
http://secunia.com/advisories/20914
21465
http://secunia.com/advisories/21465
22417
http://secunia.com/advisories/22417
ADV-2006-1046
http://www.vupen.com/english/advisories/2006/1046
ADV-2006-2554
http://www.vupen.com/english/advisories/2006/2554
DSA-1097
http://www.debian.org/security/2006/dsa-1097
DSA-1103
http://www.debian.org/security/2006/dsa-1103
RHSA-2006:0575
http://www.redhat.com/support/errata/RHSA-2006-0575.html
USN-302-1
http://www.ubuntu.com/usn/usn-302-1
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee4bb818ae35f68d1f848eae0a7b150a38eb4168
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=186295
linux-netfilter-doreplace-overflow(25400)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25400
oval:org.mitre.oval:def:10945
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10945
Common Vulnerability Exposure (CVE) ID: CVE-2006-0744
17541
http://www.securityfocus.com/bid/17541
19639
http://secunia.com/advisories/19639
19735
http://secunia.com/advisories/19735
20157
http://secunia.com/advisories/20157
20237
http://secunia.com/advisories/20237
20398
http://secunia.com/advisories/20398
21136
http://secunia.com/advisories/21136
21179
http://secunia.com/advisories/21179
21498
http://secunia.com/advisories/21498
21745
http://secunia.com/advisories/21745
21983
http://secunia.com/advisories/21983
24639
http://www.osvdb.org/24639
ADV-2006-1390
http://www.vupen.com/english/advisories/2006/1390
ADV-2006-1475
http://www.vupen.com/english/advisories/2006/1475
FEDORA-2006-423
http://lwn.net/Alerts/180820/
MDKSA-2006:086
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
MDKSA-2006:150
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
RHSA-2006:0437
http://www.redhat.com/support/errata/RHSA-2006-0437.html
RHSA-2006:0493
http://www.redhat.com/support/errata/RHSA-2006-0493.html
SUSE-SA:2006:028
http://www.novell.com/linux/security/advisories/2006-05-31.html
SUSE-SA:2006:042
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
SUSE-SA:2006:047
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
linux-uncanonical-addr-dos(25869)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25869
oval:org.mitre.oval:def:9732
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9732
Common Vulnerability Exposure (CVE) ID: CVE-2006-1055
BugTraq ID: 17402
http://www.securityfocus.com/bid/17402
http://www.osvdb.org/24443
http://secunia.com/advisories/19495
http://secunia.com/advisories/19955
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
http://www.trustix.org/errata/2006/0020
https://usn.ubuntu.com/281-1/
http://www.vupen.com/english/advisories/2006/1273
XForce ISS Database: linux-fillwritebuffer-dos(25693)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25693
Common Vulnerability Exposure (CVE) ID: CVE-2006-1056
1015966
http://securitytracker.com/id?1015966
17600
http://www.securityfocus.com/bid/17600
19715
http://secunia.com/advisories/19715
19724
http://secunia.com/advisories/19724
20060419 FreeBSD Security Advisory FreeBSD-SA-06:14.fpu
http://www.securityfocus.com/archive/1/431341
20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1
http://www.securityfocus.com/archive/1/451419/100/200/threaded
20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
http://www.securityfocus.com/archive/1/451404/100/0/threaded
20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
http://www.securityfocus.com/archive/1/451417/100/200/threaded
20061113 VMSA-2006-0009 - VMware ESX Server 3.0.0 AMD fxsave/restore issue
http://www.securityfocus.com/archive/1/451421/100/0/threaded
21035
http://secunia.com/advisories/21035
22875
http://secunia.com/advisories/22875
22876
http://secunia.com/advisories/22876
24746
http://www.osvdb.org/24746
24807
http://www.osvdb.org/24807
ADV-2006-1426
http://www.vupen.com/english/advisories/2006/1426
ADV-2006-4353
http://www.vupen.com/english/advisories/2006/4353
ADV-2006-4502
http://www.vupen.com/english/advisories/2006/4502
FreeBSD-SA-06:14
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc
RHSA-2006:0579
http://www.redhat.com/support/errata/RHSA-2006-0579.html
SUSE-SU-2014:0446
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
[linux-kernel] 20060419 RE: Linux 2.6.16.9
http://marc.info/?l=linux-kernel&m=114548768214478&w=2
amd-fpu-information-disclosure(25871)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25871
http://kb.vmware.com/kb/2533126
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.9
http://security.freebsd.org/advisories/FreeBSD-SA-06:14-amd.txt
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.vmware.com/download/esx/esx-254-200610-patch.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187910
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187911
oval:org.mitre.oval:def:9995
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9995
Common Vulnerability Exposure (CVE) ID: CVE-2006-1522
17451
http://www.securityfocus.com/bid/17451
19573
http://secunia.com/advisories/19573
24507
http://www.osvdb.org/24507
ADV-2006-1307
http://www.vupen.com/english/advisories/2006/1307
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.3
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c3a9d6541f84ac3ff566982d08389b87c1c36b4e
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188466
linux-keyringsearchone-dos(25722)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25722
oval:org.mitre.oval:def:9325
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9325
Common Vulnerability Exposure (CVE) ID: CVE-2006-1527
17806
http://www.securityfocus.com/bid/17806
19926
http://secunia.com/advisories/19926
2006-0024
http://www.trustix.org/errata/2006/0024
25229
http://www.osvdb.org/25229
ADV-2006-1632
http://www.vupen.com/english/advisories/2006/1632
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.13
linux-sctp-netfilter-dos(26194)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26194
oval:org.mitre.oval:def:10373
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10373
Common Vulnerability Exposure (CVE) ID: CVE-2006-1528
18101
http://www.securityfocus.com/bid/18101
21045
http://secunia.com/advisories/21045
21555
http://secunia.com/advisories/21555
22082
http://secunia.com/advisories/22082
22093
http://secunia.com/advisories/22093
ADV-2006-3330
http://www.vupen.com/english/advisories/2006/3330
DSA-1183
http://www.debian.org/security/2006/dsa-1183
DSA-1184
http://www.debian.org/security/2006/dsa-1184
MDKSA-2006:123
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1
http://linux.bkbits.net:8080/linux-2.6/cset%4043220081yu9ClBQNuqSSnW_9amW7iQ
http://marc.info/?l=linux-scsi&m=112540053711489&w=2
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168791
kernel-sg-dos(28510)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28510
oval:org.mitre.oval:def:11037
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11037
Common Vulnerability Exposure (CVE) ID: CVE-2006-1855
18099
http://www.securityfocus.com/bid/18099
https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=127302
oval:org.mitre.oval:def:11235
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11235
Common Vulnerability Exposure (CVE) ID: CVE-2006-1856
18105
http://www.securityfocus.com/bid/18105
25747
http://www.osvdb.org/25747
[linux-kernel] 20060426 [PATCH] LSM: add missing hook to do_compat_readv_writev()
http://www.ussg.iu.edu/hypermail/linux/kernel/0604.3/0777.html
[linux-security-module] 20050928 readv/writev syscalls are not checked by lsm
http://lists.jammed.com/linux-security-module/2005/09/0019.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191524
oval:org.mitre.oval:def:9927
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9927
Common Vulnerability Exposure (CVE) ID: CVE-2006-1857
18085
http://www.securityfocus.com/bid/18085
20185
http://secunia.com/advisories/20185
21476
http://secunia.com/advisories/21476
25695
http://www.osvdb.org/25695
ADV-2006-1893
http://www.vupen.com/english/advisories/2006/1893
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17
linux-sctp-hback-dos(26584)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26584
oval:org.mitre.oval:def:10622
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10622
Common Vulnerability Exposure (CVE) ID: CVE-2006-1858
21605
http://secunia.com/advisories/21605
22174
http://secunia.com/advisories/22174
25696
http://www.osvdb.org/25696
RHSA-2006:0617
http://www.redhat.com/support/errata/RHSA-2006-0617.html
http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm
linux-sctp-parameter-dos(26585)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26585
oval:org.mitre.oval:def:9510
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9510
Common Vulnerability Exposure (CVE) ID: CVE-2006-1859
BugTraq ID: 18033
http://www.securityfocus.com/bid/18033
http://secunia.com/advisories/20083
SuSE Security Announcement: SUSE-SA:2006:042 (Google Search)
http://www.trustix.org/errata/2006/0028
http://www.vupen.com/english/advisories/2006/1767
XForce ISS Database: linux-locks-setlease-dos(26438)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26438
Common Vulnerability Exposure (CVE) ID: CVE-2006-1860
BugTraq ID: 17943
http://www.securityfocus.com/bid/17943
http://www.osvdb.org/25425
XForce ISS Database: linux-locks-lease-init-dos(26437)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26437
Common Vulnerability Exposure (CVE) ID: CVE-2006-1864
17735
http://www.securityfocus.com/bid/17735
19869
http://secunia.com/advisories/19869
2006-0026
http://www.trustix.org/errata/2006/0026
20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2
http://www.securityfocus.com/archive/1/451426/100/200/threaded
21614
http://secunia.com/advisories/21614
22497
http://secunia.com/advisories/22497
23064
http://secunia.com/advisories/23064
25067
http://www.osvdb.org/25067
MDKSA-2006:151
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
RHSA-2006:0580
http://www.redhat.com/support/errata/RHSA-2006-0580.html
RHSA-2006:0710
http://www.redhat.com/support/errata/RHSA-2006-0710.html
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
http://www.vmware.com/download/esx/esx-202-200610-patch.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189435
kernel-smbfs-directory-traversal(26137)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26137
oval:org.mitre.oval:def:11327
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11327
Common Vulnerability Exposure (CVE) ID: CVE-2006-2071
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.osvdb.org/25139
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9978
http://www.redhat.com/support/errata/RHSA-2006-0689.html
http://secunia.com/advisories/22292
http://secunia.com/advisories/22945
http://www.vupen.com/english/advisories/2006/1391
XForce ISS Database: linux-mprotect-security-bypass(26169)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26169
Common Vulnerability Exposure (CVE) ID: CVE-2006-2271
BugTraq ID: 17910
http://www.securityfocus.com/bid/17910
Debian Security Information: DSA-1097 (Google Search)
Debian Security Information: DSA-1103 (Google Search)
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html
http://labs.musecurity.com/advisories/MU-200605-01.txt
http://www.osvdb.org/25632
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10934
http://secunia.com/advisories/19990
http://www.vupen.com/english/advisories/2006/1734
XForce ISS Database: linux-sctp-ecne-chunk-dos(26430)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26430
Common Vulnerability Exposure (CVE) ID: CVE-2006-2272
http://www.osvdb.org/25633
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11243
XForce ISS Database: linux-sctp-control-chunk-dos(26431)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26431
Common Vulnerability Exposure (CVE) ID: CVE-2006-2274
BugTraq ID: 17955
http://www.securityfocus.com/bid/17955
http://www.osvdb.org/25746
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9531
XForce ISS Database: linux-sctp-skb-pull-dos(26432)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26432
Common Vulnerability Exposure (CVE) ID: CVE-2006-2275
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11295
XForce ISS Database: linux-sctp-receive-dos(26433)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26433
Common Vulnerability Exposure (CVE) ID: CVE-2006-2444
1016153
http://securitytracker.com/id?1016153
18081
http://www.securityfocus.com/bid/18081
20182
http://secunia.com/advisories/20182
20225
http://secunia.com/advisories/20225
22822
http://secunia.com/advisories/22822
25750
http://www.osvdb.org/25750
ADV-2006-1916
http://www.vupen.com/english/advisories/2006/1916
MDKSA-2006:087
http://www.mandriva.com/security/advisories?name=MDKSA-2006:087
SUSE-SA:2006:064
http://www.novell.com/linux/security/advisories/2006_64_kernel.html
VU#681569
http://www.kb.cert.org/vuls/id/681569
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.18
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=1db6b5a66e93ff125ab871d6b3f7363412cc87e8
linux-snmp-nathelper-dos(26594)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26594
oval:org.mitre.oval:def:11318
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11318
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.