Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2006.395.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-395-1)
Summary:The remote host is missing an update for the 'linux-source-2.6.12, linux-source-2.6.15, linux-source-2.6.17' package(s) announced via the USN-395-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux-source-2.6.12, linux-source-2.6.15, linux-source-2.6.17' package(s) announced via the USN-395-1 advisory.

Vulnerability Insight:
Mark Dowd discovered that the netfilter iptables module did not
correctly handle fragmented packets. By sending specially crafted
packets, a remote attacker could exploit this to bypass firewall
rules. This has only be fixed for Ubuntu 6.10, the corresponding fix
for Ubuntu 5.10 and 6.06 will follow soon. (CVE-2006-4572)

Dmitriy Monakhov discovered an information leak in the
__block_prepare_write() function. During error recovery, this function
did not properly clear memory buffers which could allow local users to
read portions of unlinked files. This only affects Ubuntu 5.10.
(CVE-2006-4813)

ADLab Venustech Info Ltd discovered that the ATM network driver
referenced an already released pointer in some circumstances. By
sending specially crafted packets to a host over ATM, a remote
attacker could exploit this to crash that host. This does not affect
Ubuntu 6.10. (CVE-2006-4997)

Matthias Andree discovered that the NFS locking management daemon
(lockd) did not correctly handle mixing of 'lock' and 'nolock' option
mounts on the same client. A remote attacker could exploit this to
crash lockd and thus rendering the NFS imports inaccessible. This only
affects Ubuntu 5.10. (CVE-2006-5158)

The task switching code did not save and restore EFLAGS of processes.
By starting a specially crafted executable, a local attacker could
exploit this to eventually crash many other running processes. This
does not affect Ubuntu 6.10. (CVE-2006-5173)

James Morris discovered that the ip6fl_get_n() function incorrectly
handled flow labels. A local attacker could exploit this to crash the
kernel. (CVE-2006-5619)

Fabio Massimo Di Nitto discovered that the sys_get_robust_list and
sys_set_robust_list system calls lacked proper lock handling on the
powerpc platform. A local attacker could exploit this to create
unkillable processes, drain all available CPU/memory, and render the
machine unrebootable. This only affects Ubuntu 6.10. (CVE-2006-5648)

Fabio Massimo Di Nitto discovered a flaw in the alignment check
exception handling on the powerpc platform. A local attacker could
exploit this to cause a kernel panic and crash the machine.
(CVE-2006-5649)

Certain corrupted squashfs file system images caused a memory
allocation to be freed twice. By mounting a specially crafted squashfs
file system, a local attacker could exploit this to crash the kernel.
This does not affect Ubuntu 5.10. (CVE-2006-5701)

An integer overflow was found in the get_fdb_entries() function of the
network bridging code. By executing a specially crafted ioctl, a local
attacker could exploit this to execute arbitrary code with root
privileges. (CVE-2006-5751)

Affected Software/OS:
'linux-source-2.6.12, linux-source-2.6.15, linux-source-2.6.17' package(s) on Ubuntu 5.10, Ubuntu 6.06, Ubuntu 6.10.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-4572
20070615 rPSA-2007-0124-1 kernel xen
http://www.securityfocus.com/archive/1/471457
20955
http://www.securityfocus.com/bid/20955
22731
http://secunia.com/advisories/22731
22762
http://secunia.com/advisories/22762
23384
http://secunia.com/advisories/23384
23474
http://secunia.com/advisories/23474
24098
http://secunia.com/advisories/24098
25691
http://secunia.com/advisories/25691
ADV-2006-4386
http://www.vupen.com/english/advisories/2006/4386
MDKSA-2006:197
http://www.mandriva.com/security/advisories?name=MDKSA-2006:197
SUSE-SA:2006:079
http://www.novell.com/linux/security/advisories/2006_79_kernel.html
USN-395-1
http://www.ubuntu.com/usn/usn-395-1
USN-416-1
http://www.ubuntu.com/usn/usn-416-1
[linux-kernel] 20061105 Linux 2.6.16.31-rc1
http://readlist.com/lists/vger.kernel.org/linux-kernel/55/275979.html
http://www.kernel.org/git/?p=linux%2Fkernel%2Fgit%2Fstable%2Flinux-2.6.16.y.git&a=search&s=CVE-2006-4572
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=0ddfcc96928145d6a6425fdd26dad6abfe7f891d
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=6ac62be885810e1f8390f0c3b9d3ee451d3d3f19
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.31
Common Vulnerability Exposure (CVE) ID: CVE-2006-4813
21522
http://www.securityfocus.com/bid/21522
23370
http://secunia.com/advisories/23370
23752
http://secunia.com/advisories/23752
23997
http://secunia.com/advisories/23997
24206
http://secunia.com/advisories/24206
31376
http://osvdb.org/31376
DSA-1233
http://www.us.debian.org/security/2006/dsa-1233
MDKSA-2007:012
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012
MDKSA-2007:025
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025
RHSA-2007:0014
http://rhn.redhat.com/errata/RHSA-2007-0014.html
http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=152becd26e0563aefdbc4fd1fe491928efe92d1f
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207463
oval:org.mitre.oval:def:11701
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11701
Common Vulnerability Exposure (CVE) ID: CVE-2006-4997
BugTraq ID: 20363
http://www.securityfocus.com/bid/20363
Bugtraq: 20070615 rPSA-2007-0124-1 kernel xen (Google Search)
Debian Security Information: DSA-1233 (Google Search)
Debian Security Information: DSA-1237 (Google Search)
http://www.us.debian.org/security/2006/dsa-1237
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388
http://www.redhat.com/support/errata/RHSA-2006-0689.html
http://www.redhat.com/support/errata/RHSA-2006-0710.html
http://www.redhat.com/support/errata/RHSA-2007-0012.html
http://www.redhat.com/support/errata/RHSA-2007-0013.html
http://securitytracker.com/id?1017526
http://secunia.com/advisories/22253
http://secunia.com/advisories/22279
http://secunia.com/advisories/22292
http://secunia.com/advisories/22497
http://secunia.com/advisories/22945
http://secunia.com/advisories/23064
http://secunia.com/advisories/23395
http://secunia.com/advisories/23788
http://secunia.com/advisories/24288
SuSE Security Announcement: SUSE-SA:2006:079 (Google Search)
http://www.vupen.com/english/advisories/2006/3937
http://www.vupen.com/english/advisories/2006/3999
XForce ISS Database: kernel-clipmkip-dos(29387)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387
Common Vulnerability Exposure (CVE) ID: CVE-2006-5158
BugTraq ID: 21581
http://www.securityfocus.com/bid/21581
http://marc.info/?l=linux-kernel&m=113476665626446&w=2
http://marc.info/?l=linux-kernel&m=113494474208973&w=2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10128
RedHat Security Advisories: RHSA-2007:0488
http://rhn.redhat.com/errata/RHSA-2007-0488.html
http://secunia.com/advisories/23361
http://secunia.com/advisories/25838
http://secunia.com/advisories/26289
SuSE Security Announcement: SUSE-SA:2006:057 (Google Search)
http://www.novell.com/linux/security/advisories/2006_57_kernel.html
Common Vulnerability Exposure (CVE) ID: CVE-2006-5173
BugTraq ID: 21851
http://www.securityfocus.com/bid/21851
http://www.mandriva.com/security/advisories?name=MDKSA-2007:002
http://secunia.com/advisories/23593
Common Vulnerability Exposure (CVE) ID: CVE-2006-5619
BugTraq ID: 20847
http://www.securityfocus.com/bid/20847
Bugtraq: 20061109 rPSA-2006-0204-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/451097/100/0/threaded
http://lkml.org/lkml/2006/11/5/46
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9311
RedHat Security Advisories: RHSA-2007:0014
http://secunia.com/advisories/22665
http://secunia.com/advisories/22754
http://www.vupen.com/english/advisories/2006/4297
XForce ISS Database: kernel-seqfile-ipv6-dos(29970)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29970
Common Vulnerability Exposure (CVE) ID: CVE-2006-5648
BugTraq ID: 21582
http://www.securityfocus.com/bid/21582
Common Vulnerability Exposure (CVE) ID: CVE-2006-5649
BugTraq ID: 21523
http://www.securityfocus.com/bid/21523
Common Vulnerability Exposure (CVE) ID: CVE-2006-5701
BugTraq ID: 20870
http://www.securityfocus.com/bid/20870
http://www.mandriva.com/security/advisories?name=MDKSA-2007:047
http://projects.info-pull.com/mokb/MOKB-02-11-2006.html
http://secunia.com/advisories/22655
http://secunia.com/advisories/24259
XForce ISS Database: linux-squashfs-doublefree-dos(29967)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29967
Common Vulnerability Exposure (CVE) ID: CVE-2006-5751
BugTraq ID: 21353
http://www.securityfocus.com/bid/21353
Bugtraq: 20061206 rPSA-2006-0226-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/453681/100/0/threaded
http://projects.info-pull.com/mokb/MOKB-29-11-2006.html
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=4c61a7e0a86e1ae9e16867f9f8e4b0412b8edbaf;hp=4e4119a1213925568b8a1acdef9bf52b98b19da3;hb=ba8379b220509e9448c00a77cf6c15ac2a559cc7;f=net/bridge/br_ioctl.c
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10151
http://secunia.com/advisories/23073
http://secunia.com/advisories/23252
http://secunia.com/advisories/24547
SuSE Security Announcement: SUSE-SA:2007:021 (Google Search)
http://www.novell.com/linux/security/advisories/2007_21_kernel.html
http://www.vupen.com/english/advisories/2006/4781
XForce ISS Database: linux-getfdbentries-integer-overflow(30588)
https://exchange.xforce.ibmcloud.com/vulnerabilities/30588
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.