Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58877
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2007:0099
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2007:0099.

The Linux kernel handles the basic functions of the operating system.

These new kernel packages contain fixes for the following security issues:

* a flaw in the key serial number collision avoidance algorithm of the
keyctl subsystem that allowed a local user to cause a denial of service
(CVE-2007-0006, Important)

* a flaw in the Omnikey CardMan 4040 driver that allowed a local user to
execute arbitrary code with kernel privileges. In order to exploit this
issue, the Omnikey CardMan 4040 PCMCIA card must be present and the local
user must have access rights to the character device created by the driver.
(CVE-2007-0005, Moderate)

* a flaw in the core-dump handling that allowed a local user to create core
dumps from unreadable binaries via PT_INTERP. (CVE-2007-0958, Low)

In addition to the security issues described above, a fix for a kernel
panic in the powernow-k8 module, and a fix for a kernel panic when booting
the Xen domain-0 on system with large memory installations have been included.

Red Hat would like to thank Daniel Roethlisberger for reporting an issue
fixed in this erratum.

Red Hat Enterprise Linux 5 users are advised to upgrade their kernels to
the packages associated with their machine architecture and configurations
as listed in this erratum.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-0099.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : High

CVSS Score:
6.9

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-0005
20070309 Buffer Overflow in Linux Drivers for Omnikey CardMan 4040 (CVE-2007-0005)
http://www.securityfocus.com/archive/1/462300/100/0/threaded
20070615 rPSA-2007-0124-1 kernel xen
http://www.securityfocus.com/archive/1/471457
22870
http://www.securityfocus.com/bid/22870
24436
http://secunia.com/advisories/24436
24518
http://secunia.com/advisories/24518
24777
http://secunia.com/advisories/24777
24901
http://secunia.com/advisories/24901
25078
http://secunia.com/advisories/25078
25691
http://secunia.com/advisories/25691
26133
http://secunia.com/advisories/26133
26139
http://secunia.com/advisories/26139
33023
http://www.osvdb.org/33023
ADV-2007-0872
http://www.vupen.com/english/advisories/2007/0872
DSA-1286
http://www.debian.org/security/2007/dsa-1286
FEDORA-2007-335
http://fedoranews.org/cms/node/2787
FEDORA-2007-336
http://fedoranews.org/cms/node/2788
MDKSA-2007:078
http://www.mandriva.com/security/advisories?name=MDKSA-2007:078
RHSA-2007:0099
http://www.redhat.com/support/errata/RHSA-2007-0099.html
USN-486-1
http://www.ubuntu.com/usn/usn-486-1
USN-489-1
http://www.ubuntu.com/usn/usn-489-1
http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc3
https://issues.rpath.com/browse/RPL-1035
kernel-cardman4040drivers-bo(32880)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32880
oval:org.mitre.oval:def:11238
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11238
Common Vulnerability Exposure (CVE) ID: CVE-2007-0006
22539
http://www.securityfocus.com/bid/22539
24109
http://secunia.com/advisories/24109
24259
http://secunia.com/advisories/24259
24300
http://secunia.com/advisories/24300
24429
http://secunia.com/advisories/24429
24482
http://secunia.com/advisories/24482
24547
http://secunia.com/advisories/24547
24752
http://secunia.com/advisories/24752
MDKSA-2007:047
http://www.mandriva.com/security/advisories?name=MDKSA-2007:047
MDKSA-2007:060
http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
RHSA-2007:0085
http://www.redhat.com/support/errata/RHSA-2007-0085.html
SUSE-SA:2007:021
http://www.novell.com/linux/security/advisories/2007_21_kernel.html
USN-451-1
http://www.ubuntu.com/usn/usn-451-1
http://bugzilla.kernel.org/show_bug.cgi?id=7727
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=227495
https://issues.rpath.com/browse/RPL-1097
oval:org.mitre.oval:def:9829
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9829
Common Vulnerability Exposure (CVE) ID: CVE-2007-0958
BugTraq ID: 22903
http://www.securityfocus.com/bid/22903
Debian Security Information: DSA-1286 (Google Search)
Debian Security Information: DSA-1304 (Google Search)
http://www.debian.org/security/2007/dsa-1304
http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
http://osvdb.org/35930
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10343
RedHat Security Advisories: RHSA-2007:0488
http://rhn.redhat.com/errata/RHSA-2007-0488.html
http://secunia.com/advisories/25714
http://secunia.com/advisories/25838
http://secunia.com/advisories/26289
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.