English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 75516 CVE Beschreibungen
und 39786 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.66535
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2009:1671
Zusammenfassung:Redhat Security Advisory RHSA-2009:1671
Beschreibung:The remote host is missing updates announced in
advisory RHSA-2009:1671.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* a flaw was found in the Realtek r8169 Ethernet driver in the Linux
kernel. pci_unmap_single() presented a memory leak that could lead to IOMMU
space exhaustion and a system crash. An attacker on the local network could
trigger this flaw by using jumbo frames for large amounts of network
traffic. (CVE-2009-3613, Important)

* NULL pointer dereference flaws were found in the r128 driver in the Linux
kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)

* an information leak was found in the Linux kernel. On AMD64 systems,
32-bit processes could access and read certain 64-bit registers by
temporarily switching themselves to 64-bit mode. (CVE-2009-2910, Moderate)

* the unix_stream_connect() function in the Linux kernel did not check if a
UNIX domain socket was in the shutdown state. This could lead to a
deadlock. A local, unprivileged user could use this flaw to cause a denial
of service. (CVE-2009-3621, Moderate)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2009-1671.html
http://www.redhat.com/security/updates/classification/#important
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-2910
http://lkml.org/lkml/2009/10/1/164
http://marc.info/?l=oss-security&m=125442304214452&w=2
http://marc.info/?l=oss-security&m=125444390112831&w=2
http://marc.info/?l=oss-security&m=125511635004768&w=2
http://www.openwall.com/lists/oss-security/2009/10/02/1
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html
RedHat Security Advisories: RHSA-2009:1540
https://rhn.redhat.com/errata/RHSA-2009-1540.html
http://www.redhat.com/support/errata/RHSA-2009-1671.html
RedHat Security Advisories: RHSA-2010:0046
https://rhn.redhat.com/errata/RHSA-2010-0046.html
RedHat Security Advisories: RHSA-2010:0095
https://rhn.redhat.com/errata/RHSA-2010-0095.html
SuSE Security Announcement: SUSE-SA:2009:054 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html
SuSE Security Announcement: SUSE-SA:2009:056 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html
SuSE Security Announcement: SUSE-SA:2010:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
http://www.ubuntu.com/usn/usn-864-1
BugTraq ID: 36576
http://www.securityfocus.com/bid/36576
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10823
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7359
http://secunia.com/advisories/36927
http://secunia.com/advisories/37075
http://secunia.com/advisories/37351
Common Vulnerability Exposure (CVE) ID: CVE-2009-3613
http://marc.info/?l=oss-security&m=125561712529352&w=2
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
RedHat Security Advisories: RHSA-2009:1548
https://rhn.redhat.com/errata/RHSA-2009-1548.html
SuSE Security Announcement: SUSE-SA:2009:064 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html
BugTraq ID: 36706
http://www.securityfocus.com/bid/36706
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10209
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7377
http://secunia.com/advisories/37909
http://secunia.com/advisories/38794
http://secunia.com/advisories/38834
http://www.vupen.com/english/advisories/2010/0528
Common Vulnerability Exposure (CVE) ID: CVE-2009-3620
http://article.gmane.org/gmane.linux.kernel/892259
http://www.openwall.com/lists/oss-security/2009/10/19/1
http://www.openwall.com/lists/oss-security/2009/10/19/3
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html
http://www.mandriva.com/security/advisories?name=MDVSA-2010:088
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
http://www.redhat.com/support/errata/RHSA-2009-1670.html
http://www.redhat.com/support/errata/RHSA-2010-0882.html
SuSE Security Announcement: SUSE-SA:2009:061 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html
SuSE Security Announcement: SUSE-SA:2010:013 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html
BugTraq ID: 36824
http://www.securityfocus.com/bid/36824
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6763
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9891
http://secunia.com/advisories/36707
Common Vulnerability Exposure (CVE) ID: CVE-2009-3621
http://lkml.org/lkml/2009/10/19/50
http://www.openwall.com/lists/oss-security/2009/10/19/2
http://www.openwall.com/lists/oss-security/2009/10/19/4
http://www.mandriva.com/security/advisories?name=MDVSA-2009:329
SuSE Security Announcement: SUSE-SA:2010:001 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6895
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9921
http://secunia.com/advisories/37086
http://secunia.com/advisories/38017
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 39786 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.