Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55737
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2005:808
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2005:808.

The Linux kernel handles the basic functions of the operating system.

An issue was discovered that affects how page attributes are changed by the
kernel. Video drivers, which sometimes map kernel pages with a different
caching policy than write-back, are now expected to function correctly.
This change affects the x86, AMD64, and Intel EM64T architectures.

In addition the following security bugs were fixed:

The set_mempolicy system call did not check for negative numbers in the
policy field. An unprivileged local user could use this flaw to cause a
denial of service (system panic). (CVE-2005-3053)

A flaw in ioremap handling on AMD 64 and Intel EM64T systems. An
unprivileged local user could use this flaw to cause a denial of service or
minor information leak. (CVE-2005-3108)

A race condition in the ebtables netfilter module. On a SMP system that is
operating under a heavy load this flaw may allow remote attackers to cause
a denial of service (crash). (CVE-2005-3110)

A memory leak was found in key handling. An unprivileged local user could
use this flaw to cause a denial of service. (CVE-2005-3119)

A flaw in the Orinoco wireless driver. On systems running the vulnerable
drive, a remote attacker could send carefully crafted packets which would
divulge the contents of uninitialized kernel memory. (CVE-2005-3180)

A memory leak was found in the audit system. An unprivileged local user
could use this flaw to cause a denial of service. (CVE-2005-3181)

All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-808.html

Risk factor : Medium

CVSS Score:
5.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-3053
15049
http://www.securityfocus.com/bid/15049
17141
http://secunia.com/advisories/17141
17364
http://secunia.com/advisories/17364
17826
http://secunia.com/advisories/17826
19374
http://secunia.com/advisories/19374
DSA-1017
http://www.debian.org/security/2006/dsa-1017
FLSA:157459-3
http://www.securityfocus.com/archive/1/427980/100/0/threaded
MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
RHSA-2005:808
http://www.redhat.com/support/errata/RHSA-2005-808.html
USN-199-1
http://www.ubuntu.com/usn/usn-199-1
http://linux.bkbits.net:8080/linux-2.6/cset%4042eef8b09C5r6iI0LuMe5Uy3k05c5g
oval:org.mitre.oval:def:10576
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10576
Common Vulnerability Exposure (CVE) ID: CVE-2005-3108
BugTraq ID: 15049
Debian Security Information: DSA-922 (Google Search)
http://www.debian.org/security/2005/dsa-922
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11322
http://secunia.com/advisories/18056
Common Vulnerability Exposure (CVE) ID: CVE-2005-3110
http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11403
http://secunia.com/advisories/17918
SuSE Security Announcement: SUSE-SA:2005:068 (Google Search)
http://www.securityfocus.com/archive/1/419522/100/0/threaded
Common Vulnerability Exposure (CVE) ID: CVE-2005-3119
BugTraq ID: 15076
http://www.securityfocus.com/bid/15076
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11236
http://secunia.com/advisories/17114
Common Vulnerability Exposure (CVE) ID: CVE-2005-3180
BugTraq ID: 15085
http://www.securityfocus.com/bid/15085
Bugtraq: 20051012 Linux Orinoco drivers information leakage (Google Search)
http://marc.info/?l=bugtraq&m=112914754708402&w=2
Debian Security Information: DSA-1017 (Google Search)
http://www.securityfocus.com/advisories/9549
http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://www.securityfocus.com/archive/1/428058/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11332
http://www.redhat.com/support/errata/RHSA-2006-0140.html
http://www.redhat.com/support/errata/RHSA-2006-0190.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://secunia.com/advisories/17280
http://secunia.com/advisories/17917
http://secunia.com/advisories/18562
http://secunia.com/advisories/18684
http://securityreason.com/securityalert/75
SuSE Security Announcement: SUSE-SA:2005:067 (Google Search)
http://www.securityfocus.com/advisories/9806
https://usn.ubuntu.com/219-1/
Common Vulnerability Exposure (CVE) ID: CVE-2005-3181
15076
17114
17280
17917
FEDORA-2005-1007
MDKSA-2005:218
MDKSA-2005:235
SUSE-SA:2005:067
http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23
http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA
oval:org.mitre.oval:def:9467
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.