![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.67417 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2010:0439 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory RHSA-2010:0439. The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issue: * a use-after-free flaw was found in the tcp_rcv_state_process() function in the Linux kernel TCP/IP protocol suite implementation. If a system using IPv6 had the IPV6_RECVPKTINFO option set on a listening socket, a remote attacker could send an IPv6 packet to that system, causing a kernel panic (denial of service). (CVE-2010-1188, Important) This update also fixes the following bugs: * a memory leak occurred when reading files on an NFS file system that was mounted with the noac option, causing memory to slowly be consumed. Unmounting the file system did not free the memory. With this update, the memory is correctly freed, which resolves this issue. (BZ#588221) * the RHSA-2009:0225 update fixed a bug where, in some cases, on systems with the kdump service enabled, pressing Alt+SysRq+C to trigger a crash resulted in a system hang therefore, the system did not restart and boot the dump-capture kernel as expected no vmcore file was logged and the following message was displayed on the console: BUG: warning at arch/[arch]/kernel/crash.c:[xxx]/nmi_shootdown_cpus() (Not tainted) The RHSA-2009:0225 update resolved this issue by not calling printk() during a crash. It was later discovered that this fix did not resolve the issue in all cases, since there was one condition where printk() was still being called: at a warning condition inside the mdelay() call. This update replaces mdelay() calls with udelay(), where such a warning condition does not exist, which fully resolves this issue, allowing Alt+SysRq+C to work as expected. (BZ#588211) Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2010-0439.html http://www.redhat.com/security/updates/classification/#important Risk factor : High CVSS Score: 7.1 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-1188 BugTraq ID: 39016 http://www.securityfocus.com/bid/39016 http://www.openwall.com/lists/oss-security/2010/03/29/1 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9878 http://www.redhat.com/support/errata/RHSA-2010-0380.html http://www.redhat.com/support/errata/RHSA-2010-0394.html http://www.redhat.com/support/errata/RHSA-2010-0424.html http://www.redhat.com/support/errata/RHSA-2010-0439.html http://www.redhat.com/support/errata/RHSA-2010-0882.html http://www.securitytracker.com/id?1023992 http://secunia.com/advisories/39652 |
Copyright | Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |