Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.64770 |
Categoría: | Slackware Local Security Checks |
Título: | Slackware Advisory SSA:2009-231-01 kernel [updated] |
Resumen: | The remote host is missing an update as announced;via advisory SSA:2009-231-01. |
Descripción: | Summary: The remote host is missing an update as announced via advisory SSA:2009-231-01. Vulnerability Insight: This is a followup to the SSA:2009-230-01 advisory noting some errata. The generic SMP kernel update for Slackware 12.2 was built using the .config for a huge kernel, not a generic one. The kernel previously published as kernel-generic-smp and in the gemsmp.s directory works and is secure, but is larger than it needs to be. It has been replaced in the Slackware 12.2 patches with a generic SMP kernel. A new svgalib_helper package (compiled for a 2.6.27.31 kernel) was added to the Slackware 12.2 /patches. An error was noticed in the SSA:2009-230-01 advisory concerning the packages for Slackware -current 32-bit. The http links given refer to packages with a -1 build version. The actual packages have a build number of -2. Solution: Upgrade to the new package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Copyright | Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |