Executive Summary

Summary
Title Linux kernel vulnerabilities
Informations
Name USN-347-1 First vendor Publication 2006-09-18
Vendor Ubuntu Last vendor Modification 2006-09-18
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 4.9 Attack Range Local
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 5.04:
linux-image-2.6.10-6-386 2.6.10-34.24
linux-image-2.6.10-6-686 2.6.10-34.24
linux-image-2.6.10-6-686-smp 2.6.10-34.24
linux-image-2.6.10-6-amd64-generic 2.6.10-34.24
linux-image-2.6.10-6-amd64-k8 2.6.10-34.24
linux-image-2.6.10-6-amd64-k8-smp 2.6.10-34.24
linux-image-2.6.10-6-amd64-xeon 2.6.10-34.24
linux-image-2.6.10-6-hppa32 2.6.10-34.24
linux-image-2.6.10-6-hppa32-smp 2.6.10-34.24
linux-image-2.6.10-6-hppa64 2.6.10-34.24
linux-image-2.6.10-6-hppa64-smp 2.6.10-34.24
linux-image-2.6.10-6-itanium 2.6.10-34.24
linux-image-2.6.10-6-itanium-smp 2.6.10-34.24
linux-image-2.6.10-6-k7 2.6.10-34.24
linux-image-2.6.10-6-k7-smp 2.6.10-34.24
linux-image-2.6.10-6-mckinley 2.6.10-34.24
linux-image-2.6.10-6-mckinley-smp 2.6.10-34.24
linux-image-2.6.10-6-power3 2.6.10-34.24
linux-image-2.6.10-6-power3-smp 2.6.10-34.24
linux-image-2.6.10-6-power4 2.6.10-34.24
linux-image-2.6.10-6-power4-smp 2.6.10-34.24
linux-image-2.6.10-6-powerpc 2.6.10-34.24
linux-image-2.6.10-6-powerpc-smp 2.6.10-34.24
linux-image-2.6.10-6-sparc64 2.6.10-34.24
linux-image-2.6.10-6-sparc64-smp 2.6.10-34.24
linux-patch-ubuntu-2.6.10 2.6.10-34.24

Ubuntu 5.10:
linux-image-2.6.12-10-386 2.6.12-10.40
linux-image-2.6.12-10-686 2.6.12-10.40
linux-image-2.6.12-10-686-smp 2.6.12-10.40
linux-image-2.6.12-10-amd64-generic 2.6.12-10.40
linux-image-2.6.12-10-amd64-k8 2.6.12-10.40
linux-image-2.6.12-10-amd64-k8-smp 2.6.12-10.40
linux-image-2.6.12-10-amd64-xeon 2.6.12-10.40
linux-image-2.6.12-10-hppa32 2.6.12-10.40
linux-image-2.6.12-10-hppa32-smp 2.6.12-10.40
linux-image-2.6.12-10-hppa64 2.6.12-10.40
linux-image-2.6.12-10-hppa64-smp 2.6.12-10.40
linux-image-2.6.12-10-iseries-smp 2.6.12-10.40
linux-image-2.6.12-10-itanium 2.6.12-10.40
linux-image-2.6.12-10-itanium-smp 2.6.12-10.40
linux-image-2.6.12-10-k7 2.6.12-10.40
linux-image-2.6.12-10-k7-smp 2.6.12-10.40
linux-image-2.6.12-10-mckinley 2.6.12-10.40
linux-image-2.6.12-10-mckinley-smp 2.6.12-10.40
linux-image-2.6.12-10-powerpc 2.6.12-10.40
linux-image-2.6.12-10-powerpc-smp 2.6.12-10.40
linux-image-2.6.12-10-powerpc64-smp 2.6.12-10.40
linux-image-2.6.12-10-sparc64 2.6.12-10.40
linux-image-2.6.12-10-sparc64-smp 2.6.12-10.40
linux-patch-ubuntu-2.6.12 2.6.12-10.40

Ubuntu 6.06 LTS:
linux-image-2.6.15-27-386 2.6.15-27.48
linux-image-2.6.15-27-686 2.6.15-27.48
linux-image-2.6.15-27-amd64-generic 2.6.15-27.48
linux-image-2.6.15-27-amd64-k8 2.6.15-27.48
linux-image-2.6.15-27-amd64-server 2.6.15-27.48
linux-image-2.6.15-27-amd64-xeon 2.6.15-27.48
linux-image-2.6.15-27-hppa32 2.6.15-27.48
linux-image-2.6.15-27-hppa32-smp 2.6.15-27.48
linux-image-2.6.15-27-hppa64 2.6.15-27.48
linux-image-2.6.15-27-hppa64-smp 2.6.15-27.48
linux-image-2.6.15-27-itanium 2.6.15-27.48
linux-image-2.6.15-27-itanium-smp 2.6.15-27.48
linux-image-2.6.15-27-k7 2.6.15-27.48
linux-image-2.6.15-27-mckinley 2.6.15-27.48
linux-image-2.6.15-27-mckinley-smp 2.6.15-27.48
linux-image-2.6.15-27-powerpc 2.6.15-27.48
linux-image-2.6.15-27-powerpc-smp 2.6.15-27.48
linux-image-2.6.15-27-powerpc64-smp 2.6.15-27.48
linux-image-2.6.15-27-server 2.6.15-27.48
linux-image-2.6.15-27-server-bigiron 2.6.15-27.48
linux-image-2.6.15-27-sparc64 2.6.15-27.48
linux-image-2.6.15-27-sparc64-smp 2.6.15-27.48
linux-source-2.6.15 2.6.15-27.48

After a standard system upgrade you need to reboot your computer to effect the necessary changes.

ATTENTION: Due to an unavoidable ABI change the Ubuntu 6.06 kernel update has been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (linux-386, linux-powerpc, linux-amd64-generic), a standard system upgrade will automatically perform this as well.

Details follow:

Sridhar Samudrala discovered a local Denial of Service vulnerability in the handling of SCTP sockets. By opening such a socket with a special SO_LINGER value, a local attacker could exploit this to crash the kernel. (CVE-2006-4535)

Kirill Korotaev discovered that the ELF loader on the ia64 and sparc platforms did not sufficiently verify the memory layout. By attempting to execute a specially crafted executable, a local user could exploit this to crash the kernel. (CVE-2006-4538)

Original Source

Url : http://www.ubuntu.com/usn/USN-347-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10301
 
Oval ID: oval:org.mitre.oval:def:10301
Title: Linux kernel 2.6.17 and earlier, when running on IA64 or SPARC platforms, allows local users to cause a denial of service (crash) via a malformed ELF file that triggers memory maps that cross region boundaries.
Description: Linux kernel 2.6.17 and earlier, when running on IA64 or SPARC platforms, allows local users to cause a denial of service (crash) via a malformed ELF file that triggers memory maps that cross region boundaries.
Family: unix Class: vulnerability
Reference(s): CVE-2006-4538
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10530
 
Oval ID: oval:org.mitre.oval:def:10530
Title: The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745. NOTE: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch.
Description: The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745. NOTE: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch.
Family: unix Class: vulnerability
Reference(s): CVE-2006-4535
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 172

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5012650.nasl
2009-04-09 Name : Mandriva Update for kernel MDKSA-2007:060 (kernel)
File : nvt/gb_mandriva_MDKSA_2007_060.nasl
2009-03-06 Name : RedHat Update for kernel RHSA-2007:1049-01
File : nvt/gb_RHSA-2007_1049-01_kernel.nasl
2009-02-27 Name : CentOS Update for kernel CESA-2007:1049 centos3 i386
File : nvt/gb_CESA-2007_1049_kernel_centos3_i386.nasl
2009-02-27 Name : CentOS Update for kernel CESA-2007:1049 centos3 x86_64
File : nvt/gb_CESA-2007_1049_kernel_centos3_x86_64.nasl
2009-01-07 Name : RedHat Security Advisory RHSA-2008:0787
File : nvt/RHSA_2008_0787.nasl
2008-01-17 Name : Debian Security Advisory DSA 1183-1 (kernel-source-2.4.27)
File : nvt/deb_1183_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1184-1 (kernel-source-2.6.8)
File : nvt/deb_1184_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1184-2 (kernel-source-2.6.8)
File : nvt/deb_1184_2.nasl
2008-01-17 Name : Debian Security Advisory DSA 1233-1 (kernel-source-2.6.8)
File : nvt/deb_1233_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1237-1 (kernel-source-2.4.27)
File : nvt/deb_1237_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
28937 Linux Kernel SCTP Socket Crafted SO_LINGER Value DoS

28936 Linux Kernel ELF File Handling Cross-Region Mapping Local DoS

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2007-1049.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2007-0014.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2006-0617.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20071203_kernel_on_SL3.nasl - Type : ACT_GATHER_INFO
2012-05-17 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-debug-2393.nasl - Type : ACT_GATHER_INFO
2009-04-23 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2007-0014.nasl - Type : ACT_GATHER_INFO
2007-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-bigsmp-2399.nasl - Type : ACT_GATHER_INFO
2007-12-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2007-1049.nasl - Type : ACT_GATHER_INFO
2007-12-04 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2007-1049.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-347-1.nasl - Type : ACT_GATHER_INFO
2007-10-17 Name : The remote openSUSE host is missing a security update.
File : suse_kernel-2397.nasl - Type : ACT_GATHER_INFO
2007-03-12 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2007-060.nasl - Type : ACT_GATHER_INFO
2007-02-18 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-182.nasl - Type : ACT_GATHER_INFO
2007-02-09 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2007-0014.nasl - Type : ACT_GATHER_INFO
2006-12-18 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1237.nasl - Type : ACT_GATHER_INFO
2006-12-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1233.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1184.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1183.nasl - Type : ACT_GATHER_INFO
2006-10-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0689.nasl - Type : ACT_GATHER_INFO
2006-10-10 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0689.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:03:46
  • Multiple Updates