Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64333
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2009:1132
Summary:The remote host is missing updates to the Linux kernel announced in;advisory RHSA-2009:1132.;;These updated packages fix the following security issues:;; * a flaw was found in the Intel PRO/1000 network driver in the Linux;kernel. Frames with sizes near the MTU of an interface may be split across;multiple hardware receive descriptors. Receipt of such a frame could leak;through a validation check, leading to a corruption of the length check. A;remote attacker could use this flaw to send a specially-crafted packet that;would cause a denial of service. (CVE-2009-1385, Important);; * the Linux kernel Network File System daemon (nfsd) implementation did not;drop the CAP_MKNOD capability when handling requests from local,;unprivileged users. This flaw could possibly lead to an information leak or;privilege escalation. (CVE-2009-1072, Moderate);; * Frank Filz reported the NFSv4 client was missing a file permission check;for the execute bit in some situations. This could allow local,;unprivileged users to run non-executable files on NFSv4 mounted file;systems. (CVE-2009-1630, Moderate);; * a missing check was found in the hypervisor_callback() function in the;Linux kernel provided by the kernel-xen package. This could cause a denial;of service of a 32-bit guest if an application running in that guest;accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate);; * a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and;agp_generic_alloc_pages() functions did not zero out the memory pages they;allocate, which may later be available to user-space processes. This flaw;could possibly lead to an information leak. (CVE-2009-1192, Low)
Description:Summary:
The remote host is missing updates to the Linux kernel announced in
advisory RHSA-2009:1132.

These updated packages fix the following security issues:

* a flaw was found in the Intel PRO/1000 network driver in the Linux
kernel. Frames with sizes near the MTU of an interface may be split across
multiple hardware receive descriptors. Receipt of such a frame could leak
through a validation check, leading to a corruption of the length check. A
remote attacker could use this flaw to send a specially-crafted packet that
would cause a denial of service. (CVE-2009-1385, Important)

* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)

* Frank Filz reported the NFSv4 client was missing a file permission check
for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)

* a missing check was found in the hypervisor_callback() function in the
Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)

* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1072
BugTraq ID: 34205
http://www.securityfocus.com/bid/34205
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Debian Security Information: DSA-1800 (Google Search)
http://www.debian.org/security/2009/dsa-1800
http://thread.gmane.org/gmane.linux.kernel/805280
http://www.openwall.com/lists/oss-security/2009/03/23/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10314
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8382
http://www.redhat.com/support/errata/RHSA-2009-1081.html
http://secunia.com/advisories/34422
http://secunia.com/advisories/34432
http://secunia.com/advisories/34786
http://secunia.com/advisories/35121
http://secunia.com/advisories/35185
http://secunia.com/advisories/35343
http://secunia.com/advisories/35390
http://secunia.com/advisories/35394
http://secunia.com/advisories/35656
http://secunia.com/advisories/37471
SuSE Security Announcement: SUSE-SA:2009:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
SuSE Security Announcement: SUSE-SA:2009:028 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
SuSE Security Announcement: SUSE-SA:2009:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
http://www.ubuntu.com/usn/usn-793-1
http://www.vupen.com/english/advisories/2009/0802
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: linux-kernel-capmknod-security-bypass(49356)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49356
Common Vulnerability Exposure (CVE) ID: CVE-2009-1192
20090516 rPSA-2009-0084-1 kernel
http://www.securityfocus.com/archive/1/503610/100/0/threaded
20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
34673
http://www.securityfocus.com/bid/34673
34981
http://secunia.com/advisories/34981
35011
http://secunia.com/advisories/35011
35120
http://secunia.com/advisories/35120
35121
35343
35387
http://secunia.com/advisories/35387
35656
37351
http://secunia.com/advisories/37351
37471
ADV-2009-3316
DSA-1787
http://www.debian.org/security/2009/dsa-1787
DSA-1794
http://www.debian.org/security/2009/dsa-1794
DSA-1800
MDVSA-2009:119
http://www.mandriva.com/security/advisories?name=MDVSA-2009:119
MDVSA-2009:135
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
RHSA-2009:1081
SUSE-SA:2009:032
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html
SUSE-SA:2009:054
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html
SUSE-SA:2009:056
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html
USN-793-1
[oss-security] 20090422 CVE-2009-1192 kernel: agp: zero pages before sending to userspace
http://openwall.com/lists/oss-security/2009/04/22/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=59de2bebabc5027f93df999d59cc65df591c3e6e
http://wiki.rpath.com/Advisories:rPSA-2009-0084
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc3
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
https://bugzilla.redhat.com/show_bug.cgi?id=497020
oval:org.mitre.oval:def:10567
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10567
oval:org.mitre.oval:def:8003
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8003
Common Vulnerability Exposure (CVE) ID: CVE-2009-1385
20090724 rPSA-2009-0111-1 kernel
http://www.securityfocus.com/archive/1/505254/100/0/threaded
20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel
http://www.securityfocus.com/archive/1/512019/100/0/threaded
35185
http://www.securityfocus.com/bid/35185
35265
http://secunia.com/advisories/35265
35566
http://secunia.com/advisories/35566
35623
http://secunia.com/advisories/35623
35847
http://secunia.com/advisories/35847
36051
http://secunia.com/advisories/36051
36131
http://secunia.com/advisories/36131
36327
http://secunia.com/advisories/36327
54892
http://osvdb.org/54892
DSA-1844
http://www.debian.org/security/2009/dsa-1844
DSA-1865
http://www.debian.org/security/2009/dsa-1865
FEDORA-2009-6768
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html
FEDORA-2009-6846
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html
FEDORA-2009-6883
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html
MDVSA-2009:148
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148
RHSA-2009:1157
http://www.redhat.com/support/errata/RHSA-2009-1157.html
RHSA-2009:1193
http://www.redhat.com/support/errata/RHSA-2009-1193.html
RHSA-2009:1550
https://rhn.redhat.com/errata/RHSA-2009-1550.html
SUSE-SA:2009:038
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html
[oss-security] 20090603 CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service
http://www.openwall.com/lists/oss-security/2009/06/03/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10
http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302
http://wiki.rpath.com/Advisories:rPSA-2009-0111
http://www.intel.com/support/network/sb/CS-030543.htm
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8
https://bugzilla.redhat.com/show_bug.cgi?id=502981
oval:org.mitre.oval:def:11598
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598
oval:org.mitre.oval:def:11681
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681
oval:org.mitre.oval:def:8340
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340
Common Vulnerability Exposure (CVE) ID: CVE-2009-1630
BugTraq ID: 34934
http://www.securityfocus.com/bid/34934
Bugtraq: 20090724 rPSA-2009-0111-1 kernel (Google Search)
Debian Security Information: DSA-1809 (Google Search)
http://www.debian.org/security/2009/dsa-1809
Debian Security Information: DSA-1844 (Google Search)
Debian Security Information: DSA-1865 (Google Search)
http://article.gmane.org/gmane.linux.nfs/26592
http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html
http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html
http://www.openwall.com/lists/oss-security/2009/05/13/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990
http://secunia.com/advisories/35106
http://secunia.com/advisories/35298
SuSE Security Announcement: SUSE-SA:2009:038 (Google Search)
http://www.vupen.com/english/advisories/2009/1331
Common Vulnerability Exposure (CVE) ID: CVE-2009-1758
BugTraq ID: 34957
http://www.securityfocus.com/bid/34957
http://lists.xensource.com/archives/html/xen-devel/2009-05/msg00561.html
http://www.openwall.com/lists/oss-security/2009/05/14/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10313
http://secunia.com/advisories/35093
CopyrightCopyright (C) 2009 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.