Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.67039
Categoría:SuSE Local Security Checks
Título:SuSE Security Advisory SUSE-SA:2010:016 (kernel)
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing updates announced in
advisory SUSE-SA:2010:016.

The openSUSE 11.0 kernel was updated to fix following security issues:

CVE-2009-4020: Stack-based buffer overflow in the hfs subsystem in the
Linux kernel 2.6.32 allows remote attackers to have an unspecified impact
via a crafted Hierarchical File System (HFS) filesystem, related to the
hfs_readdir function in fs/hfs/dir.c.

CVE-2010-0307: The load_elf_binary function in fs/binfmt_elf.c in the
Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that
the ELF interpreter is available before a call to the SET_PERSONALITY
macro, which allows local users to cause a denial of service (system
crash) via a 32-bit application that attempts to execute a 64-bit
application and then triggers a segmentation fault, as demonstrated by
amd64_killer, related to the flush_old_exec function.

CVE-2010-0622: The wake_futex_pi function in kernel/futex.c in the
Linux kernel before 2.6.33-rc7 does not properly handle certain unlock
operations for a Priority Inheritance (PI) futex, which allows local
users to cause a denial of service (OOPS) and possibly have unspecified
other impact via vectors involving modification of the futex value from
user space.

CVE-2010-0410: drivers/connector/connector.c in the Linux kernel
before 2.6.32.8 allows local users to cause a denial of service (memory
consumption and system crash) by sending the kernel many NETLINK_CONNECTOR
messages.

CVE-2010-0415: The do_pages_move function in mm/migrate.c in the Linux
kernel before 2.6.33-rc7 does not validate node values, which allows
local users to read arbitrary kernel memory locations, cause a denial of
service (OOPS), and possibly have unspecified other impact by specifying
a node that is not part of the kernel's node set.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=SUSE-SA:2010:016

Risk factor : High

CVSS Score:
7.8

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-4020
Debian Security Information: DSA-2005 (Google Search)
http://www.debian.org/security/2010/dsa-2005
http://marc.info/?l=linux-mm-commits&m=125987755823047&w=2
http://www.openwall.com/lists/oss-security/2009/12/04/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10091
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6750
RedHat Security Advisories: RHSA-2010:0046
https://rhn.redhat.com/errata/RHSA-2010-0046.html
RedHat Security Advisories: RHSA-2010:0095
https://rhn.redhat.com/errata/RHSA-2010-0095.html
http://secunia.com/advisories/38276
http://secunia.com/advisories/39742
SuSE Security Announcement: SUSE-SA:2010:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html
SuSE Security Announcement: SUSE-SA:2010:019 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00007.html
SuSE Security Announcement: SUSE-SA:2010:023 (Google Search)
http://www.novell.com/linux/security/advisories/2010_23_kernel.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-0307
BugTraq ID: 38027
http://www.securityfocus.com/bid/38027
Bugtraq: 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX (Google Search)
http://www.securityfocus.com/archive/1/516397/100/0/threaded
Debian Security Information: DSA-1996 (Google Search)
http://www.debian.org/security/2010/dsa-1996
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html
http://www.mandriva.com/security/advisories?name=MDVSA-2010:066
http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of,20100202,15754.html
http://marc.info/?l=linux-mm&m=126466407724382&w=2
http://www.openwall.com/lists/oss-security/2010/02/01/1
http://www.openwall.com/lists/oss-security/2010/02/01/5
http://www.openwall.com/lists/oss-security/2010/02/04/1
http://www.openwall.com/lists/oss-security/2010/02/04/9
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10870
RedHat Security Advisories: RHSA-2010:0146
https://rhn.redhat.com/errata/RHSA-2010-0146.html
http://www.redhat.com/support/errata/RHSA-2010-0398.html
http://www.redhat.com/support/errata/RHSA-2010-0771.html
http://secunia.com/advisories/38492
http://secunia.com/advisories/38779
http://secunia.com/advisories/38922
http://secunia.com/advisories/39649
http://secunia.com/advisories/43315
SuSE Security Announcement: SUSE-SA:2010:014 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html
http://www.ubuntu.com/usn/USN-914-1
http://www.vupen.com/english/advisories/2010/0638
Common Vulnerability Exposure (CVE) ID: CVE-2010-0410
BugTraq ID: 38058
http://www.securityfocus.com/bid/38058
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035070.html
http://www.mandriva.com/security/advisories?name=MDVSA-2010:088
http://www.openwall.com/lists/oss-security/2010/02/03/1
http://www.openwall.com/lists/oss-security/2010/02/03/3
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10903
http://www.redhat.com/support/errata/RHSA-2010-0161.html
http://secunia.com/advisories/38557
http://secunia.com/advisories/39033
SuSE Security Announcement: SUSE-SA:2010:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00006.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-0415
BugTraq ID: 38144
http://www.securityfocus.com/bid/38144
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
http://www.openwall.com/lists/oss-security/2010/02/07/1
http://www.openwall.com/lists/oss-security/2010/02/07/2
http://www.openwall.com/lists/oss-security/2010/02/08/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9399
http://www.redhat.com/support/errata/RHSA-2010-0147.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-0622
http://www.openwall.com/lists/oss-security/2010/02/09/2
http://www.openwall.com/lists/oss-security/2010/02/11/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9655
http://secunia.com/advisories/38905
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.