Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.841303 |
Categoría: | Ubuntu Local Security Checks |
Título: | Ubuntu Update for linux USN-1696-2 |
Resumen: | The remote host is missing an update for the 'linux'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'linux' package(s) announced via the referenced advisory. Vulnerability Insight: USN-1696-1 fixed vulnerabilities in the Linux kernel. Due to an unrelated regression inotify/fanotify stopped working after upgrading. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Jon Howell reported a flaw in the Linux kernel's KVM (Kernel-based virtual machine) subsystem's handling of the XSAVE feature. On hosts, using qemu userspace, without the XSAVE feature an unprivileged local attacker could exploit this flaw to crash the system. (CVE-2012-4461) A flaw was discovered in the Linux kernel's handling of script execution when module loading is enabled. A local attacker could exploit this flaw to cause a leak of kernel stack contents. (CVE-2012-4530) Florian Weimer discovered that hypervkvpd, which is distributed in the Linux kernel, was not correctly validating source addresses of netlink packets. An untrusted local user can cause a denial of service by causing hypervkvpd to exit. (CVE-2012-5532) Affected Software/OS: linux on Ubuntu 12.04 LTS Solution: Please Install the Updated Packages. CVSS Score: 4.9 CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-4461 BugTraq ID: 56414 http://www.securityfocus.com/bid/56414 http://article.gmane.org/gmane.comp.emulators.kvm.devel/100742 http://www.openwall.com/lists/oss-security/2012/11/06/14 RedHat Security Advisories: RHSA-2013:0223 http://rhn.redhat.com/errata/RHSA-2013-0223.html RedHat Security Advisories: RHSA-2013:0882 http://rhn.redhat.com/errata/RHSA-2013-0882.html http://secunia.com/advisories/51160 SuSE Security Announcement: SUSE-SU-2012:1679 (Google Search) https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html SuSE Security Announcement: openSUSE-SU-2013:0925 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html Common Vulnerability Exposure (CVE) ID: CVE-2012-4530 http://www.openwall.com/lists/oss-security/2012/10/19/3 SuSE Security Announcement: SUSE-SU-2013:0674 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html Common Vulnerability Exposure (CVE) ID: CVE-2012-5532 BugTraq ID: 56710 http://www.securityfocus.com/bid/56710 http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 http://www.openwall.com/lists/oss-security/2012/11/27/12 RedHat Security Advisories: RHSA-2013:0807 http://rhn.redhat.com/errata/RHSA-2013-0807.html XForce ISS Database: kernel-hypervkvpd-dos(80337) https://exchange.xforce.ibmcloud.com/vulnerabilities/80337 |
Copyright | Copyright (c) 2013 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |