Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Linux kernel vulnerabilities
Informations
Name USN-302-1 First vendor Publication 2006-06-15
Vendor Ubuntu Last vendor Modification 2006-06-15
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:C)
Cvss Base Score 9 Attack Range Network
Cvss Impact Score 8.5 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 Ubuntu 5.10 Ubuntu 6.06 LTS

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 5.04:
linux-image-2.6.10-6-386 2.6.10-34.20
linux-image-2.6.10-6-686 2.6.10-34.20
linux-image-2.6.10-6-686-smp 2.6.10-34.20
linux-image-2.6.10-6-amd64-generic 2.6.10-34.20
linux-image-2.6.10-6-amd64-k8 2.6.10-34.20
linux-image-2.6.10-6-amd64-k8-smp 2.6.10-34.20
linux-image-2.6.10-6-amd64-xeon 2.6.10-34.20
linux-image-2.6.10-6-k7 2.6.10-34.20
linux-image-2.6.10-6-k7-smp 2.6.10-34.20
linux-image-2.6.10-6-power3 2.6.10-34.20
linux-image-2.6.10-6-power3-smp 2.6.10-34.20
linux-image-2.6.10-6-power4 2.6.10-34.20
linux-image-2.6.10-6-power4-smp 2.6.10-34.20
linux-image-2.6.10-6-powerpc 2.6.10-34.20
linux-image-2.6.10-6-powerpc-smp 2.6.10-34.20
linux-patch-ubuntu-2.6.10 2.6.10-34.20
linux-source-2.6.10 2.6.10-34.20
linux-tree-2.6.10 2.6.10-34.20

Ubuntu 5.10:
linux-image-2.6.12-10-386 2.6.12-10.34
linux-image-2.6.12-10-686 2.6.12-10.34
linux-image-2.6.12-10-686-smp 2.6.12-10.34
linux-image-2.6.12-10-amd64-generic 2.6.12-10.34
linux-image-2.6.12-10-amd64-k8 2.6.12-10.34
linux-image-2.6.12-10-amd64-k8-smp 2.6.12-10.34
linux-image-2.6.12-10-amd64-xeon 2.6.12-10.34
linux-image-2.6.12-10-k7 2.6.12-10.34
linux-image-2.6.12-10-k7-smp 2.6.12-10.34
linux-image-2.6.12-10-powerpc 2.6.12-10.34
linux-image-2.6.12-10-powerpc-smp 2.6.12-10.34
linux-image-2.6.12-10-powerpc64-smp 2.6.12-10.34
linux-patch-ubuntu-2.6.12 2.6.12-10.34
linux-source-2.6.12 2.6.12-10.34
linux-tree-2.6.12 2.6.12-10.34

Ubuntu 6.06 LTS:
linux-image-2.6.15-25-386 2.6.15-25.43
linux-image-2.6.15-25-686 2.6.15-25.43
linux-image-2.6.15-25-amd64-generic 2.6.15-25.43
linux-image-2.6.15-25-amd64-k8 2.6.15-25.43
linux-image-2.6.15-25-amd64-server 2.6.15-25.43
linux-image-2.6.15-25-amd64-xeon 2.6.15-25.43
linux-image-2.6.15-25-k7 2.6.15-25.43
linux-image-2.6.15-25-powerpc 2.6.15-25.43
linux-image-2.6.15-25-powerpc-smp 2. 6.15-25.43
linux-image-2.6.15-25-powerpc64-smp 2.6.15-25.43
linux-image-2.6.15-25-server 2.6.15-25.43
linux-image-2.6.15-25-server-bigiron 2.6.15-25.43
linux-source-2.6.15 2.6.15-25.43
avm-fritz-firmware 2.6.15.23
avm-fritz-firmware-2.6.15-25 2.6.15.11-2
avm-fritz-kernel-source 2.6.15.11-2
fglrx-control 2.6.15.11-2
fglrx-kernel-source 2.6.15.11-2
xorg-driver-fglrx 2.6.15.11-2
xorg-driver-fglrx-dev 2.6.15.11-2
nvidia-glx 2.6.15.11-2
nvidia-glx-dev 2.6.15.11-2
nvidia-glx-legacy 2.6.15.11-2
nvidia-glx-legacy-dev 2.6.15.11-2
linux-restricted-modules-2.6.15-25-386 2.6.15.11-2
linux-restricted-modules-2.6.15-25-686 2.6.15.11-2
linux-restricted-modules-2.6.15-25-amd64-generic 2.6.15.11-2
linux-restricted-modules-2.6.15-25-amd64-k8 2.6.15.11-2
linux-restricted-modules-2.6.15-25-amd64-xeon 2.6.15.11-2
linux-restricted-modules-2.6.15-25-k7 2.6.15.11-2
linux-restricted-modules-2.6.15-25-powerpc 2.6.15.11-2
linux-restricted-modules-2.6.15-25-powerpc-smp 2.6.15.11-2
linux-restricted-modules-386 2.6.15.23
linux-restricted-modules-686 2.6.15.23
linux-restricted-modules-amd64-generic 2.6.15.23
linux-restricted-modules-amd64-k8 2.6.15.23
linux-restricted-modules-amd64-xeon 2.6.15.23
linux-restricted-modules-common 2.6.15.11-2
linux-restricted-modules-k7 2.6.15.23
linux-restricted-modules-powerpc 2.6.15.23
linux-restricted-modules-powerpc-smp 2.6.15.23
linux-386 2.6.15.23
linux-686 2.6.15.23
linux-686-smp 2.6.15.23
linux-k7 2.6.15.23
linux-k7-smp 2.6.15.23
linux-power3 2.6.15.23
linux-power3-smp 2.6.15.23
linux-power4 2.6.15.23
linux-power4-smp 2.6.15.23
linux-powerpc 2.6.15.23
linux-powerpc-smp 2.6.15.23
linux-powerpc64-smp 2.6.15.23
linux-amd64-generic 2.6.15.23
linux-amd64-k8 2.6.15.23
linux-amd64-k8-smp 2.6.15.23
linux-amd64-server 2.6.15.23
linux-amd64-xeon 2.6.15.23
linux-server 2.6.15.23
linux-server-bigiron 2.6.15.23
linux-image-386 2.6.15.23
linux-image-686 2.6.15.23
linux-image-amd64-generic 2.6.15.23
linux-image-amd64-k8 2.6.15.23
linux-image-amd64-server 2.6.15.23
linux-image-amd64-xeon 2.6.15.23
linux-image-k7 2.6.15.23
linux-image-power3 2.6.15.23
linux-image-power3-smp 2.6.15.23
linux-image-power4 2.6.15.23
linux-image-power4-smp 2.6.15.23
linux-image-powerpc 2.6.15.23
linux-image-powerpc-smp 2.6.15.23
linux-image-powerpc64-smp 2.6.15.23
linux-image-server 2.6.15.23
linux-image-server-bigiron 2.6.15.23

After a standard system upgrade you need to reboot your computer to effect the necessary changes.

ATTENTION: Due to an unavoidable ABI change the Ubuntu 6.06 kernel update has been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (linux-386, linux-powerpc, linux-amd64-generic), a standard system upgrade will automatically perform this as well.

Details follow:

An integer overflow was discovered in the do_replace() function. A local user process with the CAP_NET_ADMIN capability could exploit this to execute arbitrary commands with full root privileges. However, none of Ubuntu's supported packages use this capability with any non-root user, so this only affects you if you use some third party software like the OpenVZ virtualization system. (CVE-2006-0038)

On EMT64 CPUs, the kernel did not properly handle uncanonical return addresses. A local user could exploit this to trigger a kernel crash. (CVE-2006-0744)

Al Viro discovered a local Denial of Service in the sysfs write buffer handling. By writing a block with a length exactly equal to the processor's page size to any writable file in /sys, a local attacker could cause a kernel crash. (CVE-2006-1055)

Jan Beulich discovered an information leak in the handling of registers for the numeric coprocessor when running on AMD processors. This allowed processes to see the coprocessor execution state of other processes, which could reveal sensitive data in the case of cryptographic computations. (CVE-2006-1056)

Marcel Holtmann discovered that the sys_add_key() did not check that a new user key is added to a proper keyring. By attempting to add a key to a normal user key (which is not a keyring), a local attacker could exploit this to crash the kernel. (CVE-2006-1522)

Ingo Molnar discovered that the SCTP protocol connection tracking module in netfilter got stuck in an infinite loop on certain empty packet chunks. A remote attacker could exploit this to cause the computer to hang. (CVE-2006-1527)

The SCSI I/O driver did not correctly handle the VM_IO flag for memory mapped pages used for data transfer. A local user could exploit this to cause a kernel crash. (CVE-2006-1528)

The choose_new_parent() contained obsolete debugging code. A local user could exploit this to cause a kernel crash. (CVE-2006-1855)

Kostik Belousov discovered that the readv() and writev() functions did not query LSM modules for access permission. This could be exploited to circumvent access restrictions defined by LSM modules such as SELinux or AppArmor. (CVE-2006-1856)

The SCTP driver did not properly verify certain parameters when receiving a HB-ACK chunk. By sending a specially crafted packet to an SCTP socket, a remote attacker could exploit this to trigger a buffer overflow, which could lead to a crash or possibly even arbitrary code execution. (CVE-2006-1857)

The sctp_walk_params() function in the SCTP driver incorrectly used rounded values for bounds checking instead of the precise values. By sending a specially crafted packet to an SCTP socket, a remote attacker could exploit this to crash the kernel. (CVE-2006-1858)

Bjoern Steinbrink reported a memory leak in the __setlease() function. A local attacker could exploit this to exhaust kernel memory and render the computer unusable (Denial of Service). (CVE-2006-1859)

Daniel Hokka Zakrisson discovered that the lease_init() did not properly handle locking. A local attacker could exploit this to cause a kernel deadlock (Denial of Service). (CVE-2006-1860)

Mark Moseley discovered that the CIFS file system driver did not filter out "..\\" path components. A local attacker could exploit this to break out of a chroot environment on a mounted SMB share. (CVE-2006-1863) The same vulnerability applies to the older smb file system. (CVE-2006-1864)

Hugh Dickins discovered that the mprotect() function allowed an user to change a read-only shared memory attachment to become writable, which bypasses IPC (inter-process communication) permissions. (CVE-2006-2071)

The SCTP (Stream Control Transmission Protocol) driver triggered a kernel panic on unexpected packets while the session was in the CLOSED state, instead of silently ignoring the packets. A remote attacker could exploit this to crash the computer. (CVE-2006-2271)

The SCTP driver did not handle control chunks if they arrived in fragmented packets. By sending specially crafted packets to an SCTP socket, a remote attacker could exploit this to crash the target machine. (CVE-2006-2272)

The SCTP driver did not correctly handle packets containing more than one DATA fragment. By sending specially crafted packets to an SCTP socket, a remote attacker could exploit this to crash the target machine. (CVE-2006-2274)

The SCTP driver did not correcly buffer incoming packets. By sending a large number of small messages to a receiver application that cannot process the messages quickly enough, a remote attacker could exploit this to cause a deadlock in the target machine (Denial of Service). (CVE-2006-2275)

Patrick McHardy discovered that the snmp_trap_decode() function did not correctly handle memory allocation in some error conditions. By sending specially crafted packets to a machine which uses the SNMP network address translation (NAT), a remote attacker could exploit this to crash that machine. (CVE-2006-2444)

In addition, the Ubuntu 6.06 LTS update fixes a range of bugs.

Original Source

Url : http://www.ubuntu.com/usn/USN-302-1

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-20 Improper Input Validation
12 % CWE-667 Insufficient Locking
12 % CWE-310 Cryptographic Issues
12 % CWE-189 Numeric Errors (CWE/SANS Top 25)
12 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10373
 
Oval ID: oval:org.mitre.oval:def:10373
Title: The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function.
Description: The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1527
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10383
 
Oval ID: oval:org.mitre.oval:def:10383
Title: Directory traversal vulnerability in CIFS in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1864.
Description: Directory traversal vulnerability in CIFS in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1864.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1863
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10622
 
Oval ID: oval:org.mitre.oval:def:10622
Title: Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk.
Description: Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1857
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10934
 
Oval ID: oval:org.mitre.oval:def:10934
Title: The ECNE chunk handling in Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via an unexpected chunk when the session is in CLOSED state.
Description: The ECNE chunk handling in Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via an unexpected chunk when the session is in CLOSED state.
Family: unix Class: vulnerability
Reference(s): CVE-2006-2271
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10945
 
Oval ID: oval:org.mitre.oval:def:10945
Title: Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function.
Description: Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function.
Family: unix Class: vulnerability
Reference(s): CVE-2006-0038
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11037
 
Oval ID: oval:org.mitre.oval:def:11037
Title: Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space.
Description: Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1528
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11235
 
Oval ID: oval:org.mitre.oval:def:11235
Title: choose_new_parent in Linux kernel before 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process.
Description: choose_new_parent in Linux kernel before 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1855
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11243
 
Oval ID: oval:org.mitre.oval:def:11243
Title: Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via incoming IP fragmented (1) COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks.
Description: Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via incoming IP fragmented (1) COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks.
Family: unix Class: vulnerability
Reference(s): CVE-2006-2272
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11295
 
Oval ID: oval:org.mitre.oval:def:11295
Title: Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (deadlock) via a large number of small messages to a receiver application that cannot process the messages quickly enough, which leads to "spillover of the receive buffer."
Description: Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (deadlock) via a large number of small messages to a receiver application that cannot process the messages quickly enough, which leads to "spillover of the receive buffer."
Family: unix Class: vulnerability
Reference(s): CVE-2006-2275
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11318
 
Oval ID: oval:org.mitre.oval:def:11318
Title: The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.
Description: The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.
Family: unix Class: vulnerability
Reference(s): CVE-2006-2444
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11327
 
Oval ID: oval:org.mitre.oval:def:11327
Title: Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.
Description: Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1864
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9325
 
Oval ID: oval:org.mitre.oval:def:9325
Title: The sys_add_key function in the keyring code in Linux kernel 2.6.16.1 and 2.6.17-rc1, and possibly earlier versions, allows local users to cause a denial of service (OOPS) via keyctl requests that add a key to a user key instead of a keyring key, which causes an invalid dereference in the __keyring_search_one function.
Description: The sys_add_key function in the keyring code in Linux kernel 2.6.16.1 and 2.6.17-rc1, and possibly earlier versions, allows local users to cause a denial of service (OOPS) via keyctl requests that add a key to a user key instead of a keyring key, which causes an invalid dereference in the __keyring_search_one function.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1522
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9510
 
Oval ID: oval:org.mitre.oval:def:9510
Title: SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters.
Description: SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1858
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9531
 
Oval ID: oval:org.mitre.oval:def:9531
Title: Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
Description: Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
Family: unix Class: vulnerability
Reference(s): CVE-2006-2274
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9732
 
Oval ID: oval:org.mitre.oval:def:9732
Title: Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
Description: Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
Family: unix Class: vulnerability
Reference(s): CVE-2006-0744
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9927
 
Oval ID: oval:org.mitre.oval:def:9927
Title: Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions.
Description: Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1856
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9978
 
Oval ID: oval:org.mitre.oval:def:9978
Title: Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.
Description: Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.
Family: unix Class: vulnerability
Reference(s): CVE-2006-2071
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9995
 
Oval ID: oval:org.mitre.oval:def:9995
Title: The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processers in a security-relevant fashion that was not addressed by the kernels.
Description: The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processers in a security-relevant fashion that was not addressed by the kernels.
Family: unix Class: vulnerability
Reference(s): CVE-2006-1056
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 10
Application 3
Os 3
Os 1
Os 783

ExploitDB Exploits

id Description
2006-06-05 Linux Kernel < 2.6.16.18 - (Netfilter NAT SNMP Module) Remote DoS Exploit

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5020521.nasl
2008-09-04 Name : FreeBSD Security Advisory (FreeBSD-SA-06:14.fpu.asc)
File : nvt/freebsdsa_fpu.nasl
2008-01-17 Name : Debian Security Advisory DSA 1097-1 (kernel-source-2.4.27)
File : nvt/deb_1097_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1103-1 (kernel-source-2.6.8)
File : nvt/deb_1103_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1183-1 (kernel-source-2.4.27)
File : nvt/deb_1183_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1184-1 (kernel-source-2.6.8)
File : nvt/deb_1184_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1184-2 (kernel-source-2.6.8)
File : nvt/deb_1184_2.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
26616 Linux Kernel fs/locks.c __setlease Function Memory Leak DoS

26615 Linux Kernel SCTP Receiver Application Small Message Saturation DoS

25750 Linux Kernel SNMP NAT Helper snmp_trap_decode() Function DoS

The Linux kernel contains a flaw that may allow a remote denial of service. The issue is triggered when the 'ip_nat_snmp_basic' module is loaded and NAT is performed on ports 161 or 162. The 'snmp_trap_decode()' function is the cause for potential multiple freeing of memory, which will result in memory corruption and hence loss of availability for the platform.
25747 Linux Kernel LSM file_permission Hook Restriction Bypass

The Linux Kernel contains a flaw that may allow a malicious user to circumvent file access restrictions. The issue is triggered because the 'writev()' and 'readv()' functions does not mediate data properly for 32-bit applications on 64-bit kernels. It is possible that the flaw may allow unauthorized access to files, resulting in a loss of confidentiality and/or integrity.
25746 Linux Kernel SCTP sctp_skb_pull Malformed Packet Remote DoS

The Linux kernel contains a flaw that may allow a remote denial of service. The issue is triggered when a SCTP packet is received that contains at least the first two fragments of a bundled message. The handling of data buffers in the kernel leads to a pointer self reference, which will lead to an infinite recursion resulting in loss of availability for the platform.
25745 Linux Kernel choose_new_parent Parent Process Termination Local DoS

25744 Linux Kernel sg Driver Dio Transfer Local DoS

25696 Linux Kernel SCTP Chunk Length Calculation Parameter Processing Overflow DoS

The Linux kernel contains a flaw that may allow a remote denial of service. The issue is triggered because of a flaw in the bounds checking process of chunk lengths and parameter lengths defined in 'include/net/sctp/sctp.h'. This might lead to attempted access of invalid memory and might result in a kernel crash and hence loss of availability for the platform.
25695 Linux Kernel SCTP HB-ACK Chunk Processing Overflow DoS

The Linux kernel contains a flaw that may allow a remote denial of service. The issue is triggered when a crafted HB-ACK chunk packet is sent to the SCTP handling code, which can be found in the '/net/sctp/sm_statefuns.c' file. The kernel then fails to properly validate the length of certain parameters, which might result in access to invalid memory and lead to loss of availability for the platform due to a kernel crash.
25633 Linux Kernel SCTP Fragmented Control Chunk Remote DoS

The Linux kernel contains a flaw that may allow a remote denial of service. The issue is present in the Stream Control Transmission Protocol (SCTP) code of the kernel. It is triggered when IP-fragmented SCTP control chunks are received by the kernel. Incorrect handling of these in the 'skb_pull()' function might result in a kernel panic, and therefore in loss of availability for the platform.
25632 Linux Kernel SCTP ECNE Chunk Handling Remote DoS

The Linux kernel contains a flaw that may allow a remote denial of service. The issue is triggered because of a flow in the kernel's Stream Control Transmission Protocol (SCTP). When a crafted 'ECNE chunk' SCTP is sent to the system, an incorrect state table entry might be created when the packet is received in closed state. This might result in a kernel panic and hence loss of availability for the platform.
25425 Linux Kernel lease_init() Function Lock Allocation Local DoS

The Linux kernel contains a flaw that may allow a local denial of service. The issue is triggered due to a error within the "lease_init()" function in "fs/locks.c" which may free memory that was not allocated using the "locks_alloc_lock()" function, and will result in loss of availability for the platform.
25229 Linux Kernel SCTP Netfilter Crafted Chunk Size DoS

The Linux Kernel contains a flaw that may allow a remote denial of service. The issue is triggered when the SCTP Netfilter handler encounters a SCTP packet with an invalid chunk size value, which will cause an infinite loop in the 'for_each_sctp_chunk()' function and therefore result in a loss of availability for the platform.
25139 Linux Kernel mprotect() Function Memory Manipulation

25068 Linux Kernel CIFS SMB Mount Traversal chroot Restriction Bypass

The Linux Kernel contains a flaw that may allow a malicious user to escape a chroot environment. The issue is triggered when a user attempts to change to a working directory outside a chroot environment in a CIFS file system using a double backslash, e.g. 'cd ..\\'. It is possible that the flaw may allow unauthorised access to file system resources, resulting in a loss of confidentiality and/or integrity.
25067 Linux Kernel SMBFS SMB Mount Traversal chroot Restriction Bypass

The Linux Kernel contains a flaw that may allow a malicious user to escape a chroot environment. The issue is triggered when a user attempts to change to a working directory outside a chroot environment in a SMBFS file system using a double backslash, e.g. 'cd ..\\'. It is possible that the flaw may allow unauthorised access to file system resources, resulting in a loss of confidentiality and/or integrity.
24807 Linux Kernel x87 Register Information Disclosure

The Linux kernel contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered because the Floating Point Units (FPUs) of the affected processor types do not save and restore the FOP, FID and FPD registers when certain instructions are executed. As a result, Linux does not clear these registers either. When a context switch occurs, a user can potentially read these uncleared registers which could disclose floating point information, resulting in a loss of confidentiality.
24746 FreeBSD FPU x87 Register Information Disclosure

FreeBSD contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered because the Floating Point Units (FPUs) of the affected processor types do not save and restore the FOP, FID and FPD registers when certain instructions are executed. As a result, FreeBSD does not clear these registers either. When a context switch occurs, a user can potentially read these uncleared registers which could disclose floating point information, resulting in a loss of confidentiality.
24639 Linux Kernel on Intel EM64T SYSRET Local DoS

The Linux Kernel contains a flaw that may allow a local denial of service. The issue is triggered when control is returned using SYSRET. The way Intel EM64T handles exceptions with uncanonical addresses might cause a Denial of Service, and will result in loss of availability for the platform.
24507 Linux Kernel __keyring_search_one() Function Local DoS

The Linux kernel contains a flaw that may allow a local denial of service. The issue is triggered in the kernel's key retention facility. When an attempt is made to add a key to a keyring that is not actually a keyring structure, the '__keyring_search_one()' function fails to detect that issue and kernel 'oops' occurs, which will result in loss of availability for the platform.
24443 Linux Kernel sysfs Crafted Write Local DoS

The Linux Kernel contains a flaw that may allow a local denial of service. The issue is triggered when exactly or more than the platform processor's page size of data is written to a 'sysfs' file. Lack of termination of a buffer in the 'fill_write_buffer()' function will result in a kernel panic and hence in loss of availability for the platform.
24040 Linux Kernel Netfilter do_replace() Function Local Overflow

Snort® IPS/IDS

Date Description
2014-01-10 Linux Kernel SNMP Netfilter Memory Corruption attempt
RuleID : 17738 - Revision : 8 - Type : SERVER-OTHER
2014-01-10 Linux Kernel snmp nat netfilter memory corruption attempt
RuleID : 13773 - Revision : 8 - Type : OS-LINUX

Nessus® Vulnerability Scanner

Date Description
2015-06-12 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2015-0068.nasl - Type : ACT_GATHER_INFO
2015-05-20 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2014-0446-1.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2012-0020.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2012-0021.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2013-0042.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2013-0043.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2006-0710.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2006-0617.nasl - Type : ACT_GATHER_INFO
2007-11-10 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-302-1.nasl - Type : ACT_GATHER_INFO
2007-01-17 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-573.nasl - Type : ACT_GATHER_INFO
2007-01-17 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-499.nasl - Type : ACT_GATHER_INFO
2007-01-17 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-500.nasl - Type : ACT_GATHER_INFO
2007-01-17 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-517.nasl - Type : ACT_GATHER_INFO
2007-01-17 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-572.nasl - Type : ACT_GATHER_INFO
2006-12-16 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-151.nasl - Type : ACT_GATHER_INFO
2006-10-25 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0710.nasl - Type : ACT_GATHER_INFO
2006-10-20 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0710.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1184.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1183.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1103.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1097.nasl - Type : ACT_GATHER_INFO
2006-10-10 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0689.nasl - Type : ACT_GATHER_INFO
2006-10-10 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0689.nasl - Type : ACT_GATHER_INFO
2006-08-30 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0617.nasl - Type : ACT_GATHER_INFO
2006-08-30 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0575.nasl - Type : ACT_GATHER_INFO
2006-08-23 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0617.nasl - Type : ACT_GATHER_INFO
2006-08-14 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0575.nasl - Type : ACT_GATHER_INFO
2006-08-04 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0437.nasl - Type : ACT_GATHER_INFO
2006-07-21 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0437.nasl - Type : ACT_GATHER_INFO
2006-07-18 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-123.nasl - Type : ACT_GATHER_INFO
2006-07-17 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0579.nasl - Type : ACT_GATHER_INFO
2006-07-05 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2006-0493.nasl - Type : ACT_GATHER_INFO
2006-05-27 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-087.nasl - Type : ACT_GATHER_INFO
2006-05-24 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2006-0493.nasl - Type : ACT_GATHER_INFO
2006-05-19 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2006-086.nasl - Type : ACT_GATHER_INFO
2006-05-15 Name : It is possible to crash the remote host by sending it an SCTP packet.
File : linux_sctp_unexpect_ecne_chunk_dos.nasl - Type : ACT_KILL_HOST
2006-05-13 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-281-1.nasl - Type : ACT_GATHER_INFO
2006-05-09 Name : It is possible to crash the remote host by sending it a malformed SCTP packet.
File : linux_sctp_chunk_header_dos.nasl - Type : ACT_KILL_HOST
2006-04-21 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-423.nasl - Type : ACT_GATHER_INFO
2006-04-21 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-421.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:03:33
  • Multiple Updates