English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 72151 CVE Beschreibungen
und 38907 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.64514
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2009:1193
Zusammenfassung:Redhat Security Advisory RHSA-2009:1193
Beschreibung:The remote host is missing updates to the Linux kernel announced in
advisory RHSA-2009:1193.

For details on the issues addressed in this update, please visit the
referenced security advisories.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2009-1193.html
http://www.redhat.com/security/updates/classification/#important
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-5966
Bugtraq: 20071218 rPSA-2007-0269-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/485282/100/0/threaded
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
Debian Security Information: DSA-1436 (Google Search)
http://www.debian.org/security/2007/dsa-1436
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
http://www.redhat.com/support/errata/RHSA-2008-0585.html
http://www.redhat.com/support/errata/RHSA-2009-1193.html
SuSE Security Announcement: SUSE-SA:2008:006 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
http://www.ubuntu.com/usn/usn-574-1
BugTraq ID: 26880
http://www.securityfocus.com/bid/26880
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10774
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8125
http://secunia.com/advisories/36131
http://secunia.com/advisories/37471
http://www.vupen.com/english/advisories/2007/4225
http://secunia.com/advisories/28105
http://secunia.com/advisories/28088
http://secunia.com/advisories/28141
http://secunia.com/advisories/28706
http://secunia.com/advisories/28806
http://secunia.com/advisories/31628
http://www.vupen.com/english/advisories/2009/3316
Common Vulnerability Exposure (CVE) ID: CVE-2009-1385
Bugtraq: 20090724 rPSA-2009-0111-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/505254/100/0/threaded
Bugtraq: 20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/512019/100/0/threaded
http://www.openwall.com/lists/oss-security/2009/06/03/2
Debian Security Information: DSA-1844 (Google Search)
http://www.debian.org/security/2009/dsa-1844
Debian Security Information: DSA-1865 (Google Search)
http://www.debian.org/security/2009/dsa-1865
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148
http://www.redhat.com/support/errata/RHSA-2009-1157.html
RedHat Security Advisories: RHSA-2009:1550
https://rhn.redhat.com/errata/RHSA-2009-1550.html
SuSE Security Announcement: SUSE-SA:2009:038 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
http://www.ubuntu.com/usn/usn-793-1
BugTraq ID: 35185
http://www.securityfocus.com/bid/35185
http://osvdb.org/54892
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11598
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11681
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8340
http://secunia.com/advisories/35265
http://secunia.com/advisories/35566
http://secunia.com/advisories/35623
http://secunia.com/advisories/36051
http://secunia.com/advisories/35847
http://secunia.com/advisories/36327
http://secunia.com/advisories/35656
Common Vulnerability Exposure (CVE) ID: CVE-2009-1388
http://marc.info/?l=oss-security&m=124654277229434&w=2
BugTraq ID: 35559
http://www.securityfocus.com/bid/35559
http://osvdb.org/55679
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8625
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8680
Common Vulnerability Exposure (CVE) ID: CVE-2009-1389
http://lkml.org/lkml/2009/6/8/194
http://marc.info/?l=linux-netdev&m=123462461713724&w=2
http://www.openwall.com/lists/oss-security/2009/06/10/1
SuSE Security Announcement: SUSE-SA:2010:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html
http://www.ubuntu.com/usn/usn-807-1
BugTraq ID: 35281
http://www.securityfocus.com/bid/35281
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10415
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8108
http://www.securitytracker.com/id?1023507
http://secunia.com/advisories/36045
http://secunia.com/advisories/37298
http://secunia.com/advisories/40645
http://www.vupen.com/english/advisories/2010/0219
http://www.vupen.com/english/advisories/2010/1857
XForce ISS Database: linux-kernel-rtl8169nic-dos(51051)
http://xforce.iss.net/xforce/xfdb/51051
Common Vulnerability Exposure (CVE) ID: CVE-2009-1895
http://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html
Debian Security Information: DSA-1845 (Google Search)
http://www.debian.org/security/2009/dsa-1845
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
http://www.redhat.com/support/errata/RHSA-2009-1438.html
RedHat Security Advisories: RHSA-2009:1540
https://rhn.redhat.com/errata/RHSA-2009-1540.html
BugTraq ID: 35647
http://www.securityfocus.com/bid/35647
http://www.osvdb.org/55807
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11768
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7826
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9453
http://secunia.com/advisories/35801
http://secunia.com/advisories/36054
http://secunia.com/advisories/36116
http://secunia.com/advisories/36759
http://www.vupen.com/english/advisories/2009/1866
Common Vulnerability Exposure (CVE) ID: CVE-2009-2406
Bugtraq: 20090728 [RISE-2009002] Linux eCryptfs parse_tag_11_packet Literal Data Buffer Overflow Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/505334/100/0/threaded
http://risesecurity.org/advisories/RISE-2009002.txt
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
SuSE Security Announcement: SUSE-SR:2009:015 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
BugTraq ID: 35851
http://www.securityfocus.com/bid/35851
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10072
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8246
http://www.securitytracker.com/id?1022663
http://secunia.com/advisories/35985
http://www.vupen.com/english/advisories/2009/2041
Common Vulnerability Exposure (CVE) ID: CVE-2009-2407
Bugtraq: 20090728 [RISE-2009003] Linux eCryptfs parse_tag_3_packet Encrypted Key Buffer Overflow Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/505337/100/0/threaded
http://risesecurity.org/advisories/RISE-2009003.txt
BugTraq ID: 35850
http://www.securityfocus.com/bid/35850
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11255
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8057
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 38907 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.