Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.60898
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2008:0237
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2008:0237.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

For details on the security issues addressed, please visit the
referenced security advisories.

Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2008-0237.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : High

CVSS Score:
7.2

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-0504
BugTraq ID: 12195
http://www.securityfocus.com/bid/12195
Debian Security Information: DSA-1067 (Google Search)
http://www.debian.org/security/2006/dsa-1067
Debian Security Information: DSA-1069 (Google Search)
http://www.debian.org/security/2006/dsa-1069
Debian Security Information: DSA-1070 (Google Search)
http://www.debian.org/security/2006/dsa-1070
Debian Security Information: DSA-1082 (Google Search)
http://www.debian.org/security/2006/dsa-1082
http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030660.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9770
http://www.redhat.com/support/errata/RHSA-2005-529.html
http://www.redhat.com/support/errata/RHSA-2005-551.html
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://www.redhat.com/support/errata/RHSA-2008-0237.html
http://securitytracker.com/id?1013273
http://secunia.com/advisories/17002
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://secunia.com/advisories/26651
http://secunia.com/advisories/30112
http://www.ubuntu.com/usn/usn-508-1
http://www.vupen.com/english/advisories/2005/1878
Common Vulnerability Exposure (CVE) ID: CVE-2007-6282
29081
http://www.securityfocus.com/bid/29081
30112
30294
http://secunia.com/advisories/30294
30818
http://secunia.com/advisories/30818
30890
http://secunia.com/advisories/30890
30962
http://secunia.com/advisories/30962
31107
http://secunia.com/advisories/31107
31551
http://secunia.com/advisories/31551
31628
http://secunia.com/advisories/31628
DSA-1630
http://www.debian.org/security/2008/dsa-1630
RHSA-2008:0237
RHSA-2008:0275
http://www.redhat.com/support/errata/RHSA-2008-0275.html
RHSA-2008:0585
http://www.redhat.com/support/errata/RHSA-2008-0585.html
SUSE-SA:2008:030
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
SUSE-SA:2008:031
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
SUSE-SA:2008:032
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
USN-625-1
http://www.ubuntu.com/usn/usn-625-1
[linux-netdev] 20080222 [Patch] Crash (BUG()) when handling fragmented ESP packets
http://marc.info/?l=linux-netdev&m=120372380411259&w=2
https://bugzilla.redhat.com/show_bug.cgi?id=404291
linux-kernel-esp-dos(42276)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42276
oval:org.mitre.oval:def:10549
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10549
Common Vulnerability Exposure (CVE) ID: CVE-2008-0007
1019357
http://securitytracker.com/id?1019357
20080208 rPSA-2008-0048-1 kernel
http://www.securityfocus.com/archive/1/487808/100/0/threaded
27686
http://www.securityfocus.com/bid/27686
27705
http://www.securityfocus.com/bid/27705
28806
http://secunia.com/advisories/28806
28826
http://secunia.com/advisories/28826
29058
http://secunia.com/advisories/29058
29570
http://secunia.com/advisories/29570
30018
http://secunia.com/advisories/30018
30110
http://secunia.com/advisories/30110
30116
http://secunia.com/advisories/30116
30769
http://secunia.com/advisories/30769
31246
http://secunia.com/advisories/31246
33280
http://secunia.com/advisories/33280
ADV-2008-0445
http://www.vupen.com/english/advisories/2008/0445/references
ADV-2008-2222
http://www.vupen.com/english/advisories/2008/2222/references
DSA-1503
http://www.debian.org/security/2008/dsa-1503
DSA-1504
http://www.debian.org/security/2008/dsa-1504
DSA-1565
http://www.debian.org/security/2008/dsa-1565
MDVSA-2008:044
http://www.mandriva.com/security/advisories?name=MDVSA-2008:044
MDVSA-2008:072
http://www.mandriva.com/security/advisories?name=MDVSA-2008:072
MDVSA-2008:112
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
MDVSA-2008:174
http://www.mandriva.com/security/advisories?name=MDVSA-2008:174
RHSA-2008:0211
http://www.redhat.com/support/errata/RHSA-2008-0211.html
RHSA-2008:0233
http://www.redhat.com/support/errata/RHSA-2008-0233.html
RHSA-2008:0787
http://www.redhat.com/support/errata/RHSA-2008-0787.html
SUSE-SA:2008:006
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
SUSE-SA:2008:017
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html
USN-618-1
http://www.ubuntu.com/usn/usn-618-1
[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
[linux-kernel] 20080206 [patch 60/73] vm audit: add VM_DONTEXPAND to mmap for drivers that need it (CVE-2008-0007)
http://lkml.org/lkml/2008/2/6/457
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.17
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1
oval:org.mitre.oval:def:9412
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9412
Common Vulnerability Exposure (CVE) ID: CVE-2008-1375
1019959
http://www.securitytracker.com/id?1019959
20080502 rPSA-2008-0157-1 kernel
http://www.securityfocus.com/archive/1/491566/100/0/threaded
20080507 rPSA-2008-0157-1 kernel
http://www.securityfocus.com/archive/1/491732/100/0/threaded
29003
http://www.securityfocus.com/bid/29003
30017
http://secunia.com/advisories/30017
30044
http://secunia.com/advisories/30044
30108
http://secunia.com/advisories/30108
30260
http://secunia.com/advisories/30260
30515
http://secunia.com/advisories/30515
ADV-2008-1406
http://www.vupen.com/english/advisories/2008/1406/references
ADV-2008-1452
http://www.vupen.com/english/advisories/2008/1452/references
FEDORA-2008-3873
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.html
MDVSA-2008:104
http://www.mandriva.com/security/advisories?name=MDVSA-2008:104
MDVSA-2008:105
http://www.mandriva.com/security/advisories?name=MDVSA-2008:105
MDVSA-2008:167
http://www.mandriva.com/security/advisories?name=MDVSA-2008:167
USN-614-1
https://usn.ubuntu.com/614-1/
[linux-kernel] 20080501 Linux 2.6.24.6
http://marc.info/?l=linux-kernel&m=120967963803205&w=2
[linux-kernel] 20080501 Linux 2.6.25.1
http://marc.info/?l=linux-kernel&m=120967964303224&w=2
http://wiki.rpath.com/Advisories:rPSA-2008-0157
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.4
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.6
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1
https://issues.rpath.com/browse/RPL-2501
linux-kernel-dnotify-privilege-escalation(42131)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42131
oval:org.mitre.oval:def:11843
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11843
Common Vulnerability Exposure (CVE) ID: CVE-2008-1615
BugTraq ID: 29086
http://www.securityfocus.com/bid/29086
Debian Security Information: DSA-1588 (Google Search)
http://www.debian.org/security/2008/dsa-1588
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00357.html
https://bugzilla.redhat.com/show_bug.cgi?id=431430
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9563
http://www.securitytracker.com/id?1020047
http://secunia.com/advisories/30252
http://secunia.com/advisories/30368
http://secunia.com/advisories/30982
SuSE Security Announcement: SUSE-SA:2008:030 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:031 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:032 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:035 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
SuSE Security Announcement: SUSE-SA:2008:038 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
XForce ISS Database: linux-kernel-processtrace-dos(42278)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42278
Common Vulnerability Exposure (CVE) ID: CVE-2008-1669
1019974
http://www.securitytracker.com/id?1019974
20080507 rPSA-2008-0162-1 kernel
http://www.securityfocus.com/archive/1/491740/100/0/threaded
29076
http://www.securityfocus.com/bid/29076
30077
http://secunia.com/advisories/30077
30101
http://secunia.com/advisories/30101
30164
http://secunia.com/advisories/30164
30252
30276
http://secunia.com/advisories/30276
30982
ADV-2008-1451
http://www.vupen.com/english/advisories/2008/1451/references
DSA-1575
http://www.debian.org/security/2008/dsa-1575
FEDORA-2008-3949
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00294.html
FEDORA-2008-4043
SUSE-SA:2008:035
SUSE-SA:2008:038
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0162
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.2
https://issues.rpath.com/browse/RPL-2518
linux-kernel-fcntlsetlk-dos(42242)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42242
oval:org.mitre.oval:def:10065
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10065
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.