English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 72151 CVE Beschreibungen
und 38907 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.51711
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2005:092
Zusammenfassung:Redhat Security Advisory RHSA-2005:092
Beschreibung:
The remote host is missing updates announced in
advisory RHSA-2005:092.

The Linux kernel handles the basic functions of the operating system.

This advisory includes fixes for several security issues:

- numerous IGMP bugs
- flaw in the page fault handler code
- flaw in the handling of uselib(2) system call
- flaw affecting the OUTS instruction of the AMD64 and Intel EM64T architecture
- incorrect DMA lock check in Direct Rendering Manager
- incorrect tables sizes used in the filesystem Native Language Support
- flaw allowing users to unlock arbitrary shared memory segments
- race exposed as a result of improvements to POSIX signal and tty standards
- flaw in mlockall in 2.6.9 kernel
- multiple flaws in sg_scsi_ioctl
- missing access check regression
- abritrary kernel memory read/rwite

For details on these issues, please visit the referenced
security advisory.

All Red Hat Enterprise Linux 4 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-092.html
http://www.isec.pl/vulnerabilities/isec-0018-igmp.txt
http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt
http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1235
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0001
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0091
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0092
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0176
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0178
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0179
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0180
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0204

Risk factor : Critical
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2004-1056
http://www.redhat.com/support/errata/RHSA-2005-529.html
http://www.redhat.com/support/errata/RHSA-2005-551.html
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://marc.theaimsgroup.com/?l=bugtraq&m=110306397320336&w=2
https://bugzilla.fedora.us/show_bug.cgi?id=2336
http://www.redhat.com/support/errata/RHSA-2005-092.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9795
http://www.vupen.com/english/advisories/2005/1878
http://secunia.com/advisories/17002
XForce ISS Database: linux-i810-dma-dos(15972)
http://xforce.iss.net/xforce/xfdb/15972
Common Vulnerability Exposure (CVE) ID: CVE-2004-1137
Bugtraq: 20041214 Linux kernel IGMP vulnerabilities (Google Search)
http://isec.pl/vulnerabilities/isec-0018-igmp.txt
Conectiva Linux advisory: CLA-2005:930
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
Bugtraq: 20041214 [USN-38-1] Linux kernel vulnerabilities (Google Search)
SuSE Security Announcement: SUSE-SA:2004:044 (Google Search)
http://www.novell.com/linux/security/advisories/2004_44_kernel.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11144
XForce ISS Database: linux-igmpmarksources-dos(18482)
http://xforce.iss.net/xforce/xfdb/18482
XForce ISS Database: linux-ipmcsource-code-execution(18481)
http://xforce.iss.net/xforce/xfdb/18481
Common Vulnerability Exposure (CVE) ID: CVE-2004-1235
Bugtraq: 20050107 Linux kernel sys_uselib local root vulnerability (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=110512575901427&w=2
http://isec.pl/vulnerabilities/isec-0021-uselib.txt
Debian Security Information: DSA-1070 (Google Search)
http://www.debian.org/security/2006/dsa-1070
Debian Security Information: DSA-1067 (Google Search)
http://www.debian.org/security/2006/dsa-1067
Debian Security Information: DSA-1069 (Google Search)
http://www.debian.org/security/2006/dsa-1069
Debian Security Information: DSA-1082 (Google Search)
http://www.debian.org/security/2006/dsa-1082
http://www.securityfocus.com/advisories/7806
http://www.securityfocus.com/advisories/7805
http://www.redhat.com/support/errata/RHSA-2005-043.html
http://www.redhat.com/support/errata/RHSA-2005-016.html
http://www.redhat.com/support/errata/RHSA-2005-017.html
SuSE Security Announcement: SUSE-SR:2005:001 (Google Search)
http://www.novell.com/linux/security/advisories/2005_01_sr.html
http://www.trustix.org/errata/2005/0001/
BugTraq ID: 12190
http://www.securityfocus.com/bid/12190
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9567
http://secunia.com/advisories/20162
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
XForce ISS Database: linux-uselib-gain-privileges(18800)
http://xforce.iss.net/xforce/xfdb/18800
Common Vulnerability Exposure (CVE) ID: CVE-2005-0001
Bugtraq: 20050112 Linux kernel i386 SMP page fault handler privilege escalation (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=110554694522719&w=2
http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html
http://isec.pl/vulnerabilities/isec-0022-pagefault.txt
Bugtraq: 20050114 [USN-60-0] Linux kernel vulnerabilities (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=110581146702951&w=2
BugTraq ID: 12244
http://www.securityfocus.com/bid/12244
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10322
http://securitytracker.com/id?1012862
http://secunia.com/advisories/13822
XForce ISS Database: linux-fault-handler-gain-privileges(18849)
http://xforce.iss.net/xforce/xfdb/18849
Common Vulnerability Exposure (CVE) ID: CVE-2005-0090
BugTraq ID: 12599
http://www.securityfocus.com/bid/12599
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10425
XForce ISS Database: red-hat-regression-dos(20618)
http://xforce.iss.net/xforce/xfdb/20618
Common Vulnerability Exposure (CVE) ID: CVE-2005-0091
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11249
XForce ISS Database: red-hat-patch-gain-privileges(20619)
http://xforce.iss.net/xforce/xfdb/20619
Common Vulnerability Exposure (CVE) ID: CVE-2005-0092
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11647
XForce ISS Database: red-hat-patch-dos(20620)
http://xforce.iss.net/xforce/xfdb/20620
Common Vulnerability Exposure (CVE) ID: CVE-2005-0176
Bugtraq: 20050215 [USN-82-1] Linux kernel vulnerabilities (Google Search)
http://marc.theaimsgroup.com/?l=full-disclosure&m=110846102231365&w=2
http://www.redhat.com/support/errata/RHSA-2005-472.html
SGI Security Advisory: 20060402-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
BugTraq ID: 12598
http://www.securityfocus.com/bid/12598
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1225
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8778
http://secunia.com/advisories/19607
Common Vulnerability Exposure (CVE) ID: CVE-2005-0177
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10298
Common Vulnerability Exposure (CVE) ID: CVE-2005-0178
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10647
Common Vulnerability Exposure (CVE) ID: CVE-2005-0179
http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030660.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9890
Common Vulnerability Exposure (CVE) ID: CVE-2005-0180
Bugtraq: 20050107 grsecurity 2.1.0 release / 5 Linux kernel advisories (Google Search)
http://www.securityfocus.com/archive/1/386374
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
BugTraq ID: 12198
http://www.securityfocus.com/bid/12198
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10667
http://secunia.com/advisories/17826
Common Vulnerability Exposure (CVE) ID: CVE-2005-0204
http://www.redhat.com/support/errata/RHSA-2005-293.html
http://www.trustix.org/errata/2006/0006
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10320
http://secunia.com/advisories/18784
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 38907 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.