Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2006.311.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-311-1)
Summary:The remote host is missing an update for the 'linux-meta, linux-restricted-modules-2.6.15, linux-source-2.6.10, linux-source-2.6.12, linux-source-2.6.15' package(s) announced via the USN-311-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-meta, linux-restricted-modules-2.6.15, linux-source-2.6.10, linux-source-2.6.12, linux-source-2.6.15' package(s) announced via the USN-311-1 advisory.

Vulnerability Insight:
A race condition was discovered in the do_add_counters() functions.
Processes which do not run with full root privileges, but have the
CAP_NET_ADMIN capability can exploit this to crash the machine or read
a random piece of kernel memory. In Ubuntu there are no packages that
are affected by this, so this can only be an issue for you if you use
third-party software that uses Linux capabilities. (CVE-2006-0039)

John Stultz discovered a faulty BUG_ON trigger in the handling of
POSIX timers. A local attacker could exploit this to trigger a kernel
oops and crash the machine. (CVE-2006-2445)

Dave Jones discovered that the PowerPC kernel did not perform certain
required access_ok() checks. A local user could exploit this to read
arbitrary kernel memory and crash the kernel on 64-bit systems, and
possibly read arbitrary kernel memory on 32-bit systems.
(CVE-2006-2448)

A design flaw was discovered in the prctl(PR_SET_DUMPABLE, ...) system
call, which allowed a local user to have core dumps created in a
directory he could not normally write to. This could be exploited to
drain available disk space on system partitions, or, under some
circumstances, to execute arbitrary code with full root privileges.
This flaw only affects Ubuntu 6.06 LTS. (CVE-2006-2451)

In addition, the Ubuntu 6.06 LTS update fixes a range of bugs.

Affected Software/OS:
'linux-meta, linux-restricted-modules-2.6.15, linux-source-2.6.10, linux-source-2.6.12, linux-source-2.6.15' package(s) on Ubuntu 5.04, Ubuntu 5.10, Ubuntu 6.06.

Solution:
Please install the updated package(s).

CVSS Score:
5.6

CVSS Vector:
AV:L/AC:H/Au:N/C:C/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-0039
18113
http://www.securityfocus.com/bid/18113
20185
http://secunia.com/advisories/20185
20671
http://secunia.com/advisories/20671
20914
http://secunia.com/advisories/20914
20991
http://secunia.com/advisories/20991
21476
http://secunia.com/advisories/21476
22292
http://secunia.com/advisories/22292
22945
http://secunia.com/advisories/22945
25697
http://www.osvdb.org/25697
ADV-2006-1893
http://www.vupen.com/english/advisories/2006/1893
ADV-2006-2554
http://www.vupen.com/english/advisories/2006/2554
DSA-1097
http://www.debian.org/security/2006/dsa-1097
DSA-1103
http://www.debian.org/security/2006/dsa-1103
RHSA-2006:0689
http://www.redhat.com/support/errata/RHSA-2006-0689.html
USN-311-1
http://www.ubuntu.com/usn/usn-311-1
http://bugs.gentoo.org/show_bug.cgi?id=133465
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2722971cbe831117686039d5c334f2c0f560be13
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=191698
linux-doaddcounters-race-condition(26583)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26583
oval:org.mitre.oval:def:10309
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10309
Common Vulnerability Exposure (CVE) ID: CVE-2006-2445
BugTraq ID: 18615
http://www.securityfocus.com/bid/18615
Bugtraq: 20060623 rPSA-2006-0110-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/438168/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
http://www.mandriva.com/security/advisories?name=MDKSA-2006:151
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=30f1e3dd8c72abda343bcf415f7d8894a02b4290
http://marc.info/?l=linux-kernel&m=115015841413687
http://www.osvdb.org/26947
http://secunia.com/advisories/20703
http://secunia.com/advisories/20831
http://secunia.com/advisories/21045
http://secunia.com/advisories/21179
SuSE Security Announcement: SUSE-SA:2006:042 (Google Search)
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
http://www.trustix.org/errata/2006/0037
http://www.vupen.com/english/advisories/2006/2451
XForce ISS Database: linux-runposixcputimers-dos(27380)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27380
Common Vulnerability Exposure (CVE) ID: CVE-2006-2448
18616
http://www.securityfocus.com/bid/18616
2006-0037
20060623 rPSA-2006-0110-1 kernel
20703
20831
21179
21465
http://secunia.com/advisories/21465
21498
http://secunia.com/advisories/21498
22417
http://secunia.com/advisories/22417
ADV-2006-2451
RHSA-2006:0575
http://www.redhat.com/support/errata/RHSA-2006-0575.html
SUSE-SA:2006:042
SUSE-SA:2006:047
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c85d1f9d358b24c5b05c3a2783a78423775a080
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.21
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=194215
oval:org.mitre.oval:def:10040
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10040
Common Vulnerability Exposure (CVE) ID: CVE-2006-2451
BugTraq ID: 18874
http://www.securityfocus.com/bid/18874
Bugtraq: 20060707 rPSA-2006-0122-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/439483/100/100/threaded
Bugtraq: 20060710 Re: rPSA-2006-0122-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/439610/100/100/threaded
Bugtraq: 20060712 Linux Kernel 2.6.x PRCTL Core Dump Handling - Local r00t Exploit ( BID 18874 / CVE-2006-2451 ) (Google Search)
http://www.securityfocus.com/archive/1/439869/100/0/threaded
Bugtraq: 20060713 Linux sys_prctl LKM based hotfix (Google Search)
http://www.securityfocus.com/archive/1/440118/100/0/threaded
Bugtraq: 20060713 Re: [Full-disclosure] Re: Linux Kernel 2.6.x PRCTL Core Dump Handling - Local r00t Exploit ( BID 18874 / CVE-2006-2451 ) (Google Search)
http://www.securityfocus.com/archive/1/440117/100/0/threaded
Bugtraq: 20060714 Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround (Google Search)
http://www.securityfocus.com/archive/1/440057/100/0/threaded
Bugtraq: 20060716 Re: Linux Kernel 2.6.x PRCTL Core Dump Handling -- Simple workaround (Google Search)
http://www.securityfocus.com/archive/1/440379/100/0/threaded
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=195902
http://www.osvdb.org/27030
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11336
http://www.redhat.com/support/errata/RHSA-2006-0574.html
http://securitytracker.com/id?1016451
http://secunia.com/advisories/20953
http://secunia.com/advisories/20960
http://secunia.com/advisories/20965
http://secunia.com/advisories/20986
http://secunia.com/advisories/21966
SuSE Security Announcement: SUSE-SA:2006:047 (Google Search)
SuSE Security Announcement: SUSE-SA:2006:049 (Google Search)
http://www.novell.com/linux/security/advisories/2006_49_kernel.html
SuSE Security Announcement: SUSE-SR:2006:016 (Google Search)
http://www.novell.com/linux/security/advisories/2006_16_sr.html
SuSE Security Announcement: SUSE-SR:2006:017 (Google Search)
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.vupen.com/english/advisories/2006/2699
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.