Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.65695
Categoría:SuSE Local Security Checks
Título:SLES11: Security update for Linux kernel
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing updates to packages that affect
the security of your system. One or more of the following packages
are affected:

ext4dev-kmp-default
ext4dev-kmp-pae
ext4dev-kmp-vmi
ext4dev-kmp-xen
kernel-default
kernel-default-base
kernel-pae
kernel-pae-base
kernel-source
kernel-syms
kernel-vmi
kernel-vmi-base
kernel-xen
kernel-xen-base

References:
https://bugzilla.novell.com/show_bug.cgi?id=499152
https://bugzilla.novell.com/show_bug.cgi?id=495091
https://bugzilla.novell.com/show_bug.cgi?id=439775
https://bugzilla.novell.com/show_bug.cgi?id=493214
https://bugzilla.novell.com/show_bug.cgi?id=516213
https://bugzilla.novell.com/show_bug.cgi?id=476525
https://bugzilla.novell.com/show_bug.cgi?id=516827
https://bugzilla.novell.com/show_bug.cgi?id=509544
https://bugzilla.novell.com/show_bug.cgi?id=514644
https://bugzilla.novell.com/show_bug.cgi?id=503855
https://bugzilla.novell.com/show_bug.cgi?id=509071
https://bugzilla.novell.com/show_bug.cgi?id=475149
https://bugzilla.novell.com/show_bug.cgi?id=495065
https://bugzilla.novell.com/show_bug.cgi?id=498369
https://bugzilla.novell.com/show_bug.cgi?id=450658
https://bugzilla.novell.com/show_bug.cgi?id=503635
https://bugzilla.novell.com/show_bug.cgi?id=497648
https://bugzilla.novell.com/show_bug.cgi?id=511243
https://bugzilla.novell.com/show_bug.cgi?id=509822
https://bugzilla.novell.com/show_bug.cgi?id=507557
https://bugzilla.novell.com/show_bug.cgi?id=506361
https://bugzilla.novell.com/show_bug.cgi?id=481074
https://bugzilla.novell.com/show_bug.cgi?id=484716
https://bugzilla.novell.com/show_bug.cgi?id=500429
https://bugzilla.novell.com/show_bug.cgi?id=487247
https://bugzilla.novell.com/show_bug.cgi?id=478462
https://bugzilla.novell.com/show_bug.cgi?id=501396
https://bugzilla.novell.com/show_bug.cgi?id=476822
https://bugzilla.novell.com/show_bug.cgi?id=485768
https://bugzilla.novell.com/show_bug.cgi?id=502903
https://bugzilla.novell.com/show_bug.cgi?id=497341
https://bugzilla.novell.com/show_bug.cgi?id=498358
https://bugzilla.novell.com/show_bug.cgi?id=499845
https://bugzilla.novell.com/show_bug.cgi?id=491802
https://bugzilla.novell.com/show_bug.cgi?id=505578
https://bugzilla.novell.com/show_bug.cgi?id=191648
https://bugzilla.novell.com/show_bug.cgi?id=185164
https://bugzilla.novell.com/show_bug.cgi?id=501651
https://bugzilla.novell.com/show_bug.cgi?id=502675
https://bugzilla.novell.com/show_bug.cgi?id=502903
https://bugzilla.novell.com/show_bug.cgi?id=499278
https://bugzilla.novell.com/show_bug.cgi?id=503353
https://bugzilla.novell.com/show_bug.cgi?id=395775

More details may also be found by searching for the SuSE
Enterprise Server 11 patch database located at
http://download.novell.com/patch/finder/

Solution:

Please install the updates provided by SuSE.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-1961
BugTraq ID: 35143
http://www.securityfocus.com/bid/35143
Debian Security Information: DSA-1844 (Google Search)
http://www.debian.org/security/2009/dsa-1844
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148
http://www.openwall.com/lists/oss-security/2009/05/29/2
http://www.openwall.com/lists/oss-security/2009/05/30/1
http://www.openwall.com/lists/oss-security/2009/06/02/2
http://www.openwall.com/lists/oss-security/2009/06/03/1
http://www.redhat.com/support/errata/RHSA-2009-1157.html
http://securitytracker.com/id?1022307
http://secunia.com/advisories/35390
http://secunia.com/advisories/35394
http://secunia.com/advisories/35656
http://secunia.com/advisories/35847
http://secunia.com/advisories/36051
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
SuSE Security Announcement: SUSE-SA:2009:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
SuSE Security Announcement: SUSE-SA:2009:038 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
http://www.ubuntu.com/usn/usn-793-1
Common Vulnerability Exposure (CVE) ID: CVE-2009-1389
BugTraq ID: 35281
http://www.securityfocus.com/bid/35281
Bugtraq: 20090724 rPSA-2009-0111-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/505254/100/0/threaded
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Debian Security Information: DSA-1865 (Google Search)
http://www.debian.org/security/2009/dsa-1865
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
http://lkml.org/lkml/2009/6/8/194
http://marc.info/?l=linux-netdev&m=123462461713724&w=2
http://www.openwall.com/lists/oss-security/2009/06/10/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108
http://www.redhat.com/support/errata/RHSA-2009-1193.html
http://www.securitytracker.com/id?1023507
http://secunia.com/advisories/35265
http://secunia.com/advisories/35566
http://secunia.com/advisories/36045
http://secunia.com/advisories/36131
http://secunia.com/advisories/36327
http://secunia.com/advisories/37298
http://secunia.com/advisories/37471
http://secunia.com/advisories/40645
SuSE Security Announcement: SUSE-SA:2010:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html
http://www.ubuntu.com/usn/usn-807-1
http://www.vupen.com/english/advisories/2009/3316
http://www.vupen.com/english/advisories/2010/0219
http://www.vupen.com/english/advisories/2010/1857
XForce ISS Database: linux-kernel-rtl8169nic-dos(51051)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51051
Common Vulnerability Exposure (CVE) ID: CVE-2009-1385
BugTraq ID: 35185
http://www.securityfocus.com/bid/35185
Bugtraq: 20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel (Google Search)
http://www.securityfocus.com/archive/1/512019/100/0/threaded
http://www.openwall.com/lists/oss-security/2009/06/03/2
http://osvdb.org/54892
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340
RedHat Security Advisories: RHSA-2009:1550
https://rhn.redhat.com/errata/RHSA-2009-1550.html
http://secunia.com/advisories/35623
Common Vulnerability Exposure (CVE) ID: CVE-2009-1630
BugTraq ID: 34934
http://www.securityfocus.com/bid/34934
Debian Security Information: DSA-1809 (Google Search)
http://www.debian.org/security/2009/dsa-1809
http://article.gmane.org/gmane.linux.nfs/26592
http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html
http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html
http://www.openwall.com/lists/oss-security/2009/05/13/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990
http://secunia.com/advisories/35106
http://secunia.com/advisories/35298
http://www.vupen.com/english/advisories/2009/1331
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.