Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.60970
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDVSA-2008:105 (kernel)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to kernel
announced via advisory MDVSA-2008:105.

The CIFS filesystem in the Linux kernel before 2.6.22, when Unix
extension support is enabled, does not honor the umask of a process,
which allows local users to gain privileges. (CVE-2007-3740)

The drm/i915 component in the Linux kernel before 2.6.22.2, when
used with i965G and later chipsets, allows local users with access
to an X11 session and Direct Rendering Manager (DRM) to write
to arbitrary memory locations and gain privileges via a crafted
batchbuffer. (CVE-2007-3851)

The (1) hugetlb_vmtruncate_list and (2) hugetlb_vmtruncate functions
in fs/hugetlbfs/inode.c in the Linux kernel before 2.6.19-rc4 perform
certain prio_tree calculations using HPAGE_SIZE instead of PAGE_SIZE
units, which allows local users to cause a denial of service (panic)
via unspecified vectors. (CVE-2007-4133)

The IA32 system call emulation functionality in Linux kernel 2.4.x
and 2.6.x before 2.6.22.7, when running on the x86_64 architecture,
does not zero extend the eax register after the 32bit entry path to
ptrace is used, which might allow local users to gain privileges by
triggering an out-of-bounds access to the system call table using
the %RAX register. This vulnerability is now being fixed in the Xen
kernel too. (CVE-2007-4573)

Integer underflow in the ieee80211_rx function in
net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before
2.6.23 allows remote attackers to cause a denial of service (crash)
via a crafted SKB length value in a runt IEEE 802.11 frame when
the IEEE80211_STYPE_QOS_DATA flag is set, aka an off-by-two
error. (CVE-2007-4997)

The disconnect method in the Philips USB Webcam (pwc) driver in Linux
kernel 2.6.x before 2.6.22.6 relies on user space to close the device,
which allows user-assisted local attackers to cause a denial of service
(USB subsystem hang and CPU consumption in khubd) by not closing the
device after the disconnect is invoked. NOTE: this rarely crosses
privilege boundaries, unless the attacker can convince the victim to
unplug the affected device. (CVE-2007-5093)

A race condition in the directory notification subsystem (dnotify)
in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1,
allows local users to cause a denial of service (OOPS) and possibly
gain privileges via unspecified vectors. (CVE-2008-1375)

The Linux kernel before 2.6.25.2 does not apply a certain protection
mechanism for fcntl functionality, which allows local users to (1)
execute code in parallel or (2) exploit a race condition to obtain
re-ordered access to the descriptor table. (CVE-2008-1669)

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate

Affected: 2007.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2008:105

Risk factor : High

CVSS Score:
7.2

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-3740
25672
http://www.securityfocus.com/bid/25672
26760
http://secunia.com/advisories/26760
26955
http://secunia.com/advisories/26955
26978
http://secunia.com/advisories/26978
27436
http://secunia.com/advisories/27436
27747
http://secunia.com/advisories/27747
27912
http://secunia.com/advisories/27912
28806
http://secunia.com/advisories/28806
29058
http://secunia.com/advisories/29058
DSA-1378
http://www.debian.org/security/2007/dsa-1378
DSA-1504
http://www.debian.org/security/2008/dsa-1504
MDVSA-2008:008
http://www.mandriva.com/security/advisories?name=MDVSA-2008:008
MDVSA-2008:105
http://www.mandriva.com/security/advisories?name=MDVSA-2008:105
RHSA-2007:0705
http://www.redhat.com/support/errata/RHSA-2007-0705.html
RHSA-2007:0939
http://www.redhat.com/support/errata/RHSA-2007-0939.html
SUSE-SA:2007:064
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
SUSE-SA:2008:006
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
USN-518-1
http://www.ubuntu.com/usn/usn-518-1
http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
https://bugzilla.redhat.com/show_bug.cgi?id=253314
kernel-cifs-filesystem-dos(36593)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36593
oval:org.mitre.oval:def:9953
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9953
Common Vulnerability Exposure (CVE) ID: CVE-2007-3851
25263
http://www.securityfocus.com/bid/25263
26389
http://secunia.com/advisories/26389
26450
http://secunia.com/advisories/26450
26500
http://secunia.com/advisories/26500
26643
http://secunia.com/advisories/26643
26664
http://secunia.com/advisories/26664
27227
http://secunia.com/advisories/27227
ADV-2007-2854
http://www.vupen.com/english/advisories/2007/2854
DSA-1356
http://www.debian.org/security/2007/dsa-1356
SUSE-SA:2007:051
http://www.novell.com/linux/security/advisories/2007_51_kernel.html
SUSE-SA:2007:053
http://www.novell.com/linux/security/advisories/2007_53_kernel.html
USN-509-1
http://www.ubuntu.com/usn/usn-509-1
USN-510-1
http://www.ubuntu.com/usn/usn-510-1
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2
https://issues.rpath.com/browse/RPL-1620
oval:org.mitre.oval:def:11196
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11196
Common Vulnerability Exposure (CVE) ID: CVE-2007-4133
25904
http://www.securityfocus.com/bid/25904
26994
http://secunia.com/advisories/26994
27322
http://secunia.com/advisories/27322
28170
http://secunia.com/advisories/28170
28971
http://secunia.com/advisories/28971
DSA-1381
http://www.debian.org/security/2007/dsa-1381
MDKSA-2007:216
http://www.mandriva.com/security/advisories?name=MDKSA-2007:216
RHSA-2007:0940
http://www.redhat.com/support/errata/RHSA-2007-0940.html
USN-558-1
http://www.ubuntu.com/usn/usn-558-1
USN-578-1
http://www.ubuntu.com/usn/usn-578-1
http://tree.celinuxforum.org/gitstat/commit-detail.php?commit=856fc29505556cf263f3dcda2533cf3766c14ab6
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.19-rc4
kernel-hugetlbfs-dos(36925)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36925
oval:org.mitre.oval:def:10451
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10451
Common Vulnerability Exposure (CVE) ID: CVE-2007-4573
1018748
http://securitytracker.com/id?1018748
20070924 COSEINC Linux Advisory #2: IA32 System Call
http://marc.info/?l=full-disclosure&m=119062587407908&w=2
20070924 COSEINC Linux Advisory #2: IA32 System Call Emulation Vulnerability
http://www.securityfocus.com/archive/1/480451/100/0/threaded
20070926 Re: COSEINC Linux Advisory #2: IA32 System CallEmulation Vulnerability
http://www.securityfocus.com/archive/1/480705/100/0/threaded
25774
http://www.securityfocus.com/bid/25774
26917
http://secunia.com/advisories/26917
26919
http://secunia.com/advisories/26919
26934
http://secunia.com/advisories/26934
26953
http://secunia.com/advisories/26953
26995
http://secunia.com/advisories/26995
27212
http://secunia.com/advisories/27212
ADV-2007-3246
http://www.vupen.com/english/advisories/2007/3246
FEDORA-2007-2298
http://fedoranews.org/updates/FEDORA-2007-229.shtml
FEDORA-2007-712
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00355.html
MDKSA-2007:195
http://www.mandriva.com/security/advisories?name=MDKSA-2007:195
MDKSA-2007:196
http://www.mandriva.com/security/advisories?name=MDKSA-2007:196
RHSA-2007:0936
http://www.redhat.com/support/errata/RHSA-2007-0936.html
RHSA-2007:0937
http://www.redhat.com/support/errata/RHSA-2007-0937.html
RHSA-2007:0938
http://www.redhat.com/support/errata/RHSA-2007-0938.html
[linux-kernel] 20070921 Linux 2.6.22.7
http://lkml.org/lkml/2007/9/21/512
[linux-kernel] 20070921 Re: Linux 2.6.22.7
http://lkml.org/lkml/2007/9/21/513
http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.35.3
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.7
https://issues.rpath.com/browse/RPL-1754
oval:org.mitre.oval:def:9735
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9735
Common Vulnerability Exposure (CVE) ID: CVE-2007-4997
26337
http://www.securityfocus.com/bid/26337
27555
http://secunia.com/advisories/27555
27614
http://secunia.com/advisories/27614
27824
http://secunia.com/advisories/27824
28033
http://secunia.com/advisories/28033
28162
http://secunia.com/advisories/28162
28706
http://secunia.com/advisories/28706
ADV-2007-3718
http://www.vupen.com/english/advisories/2007/3718
DSA-1428
http://www.debian.org/security/2007/dsa-1428
MDKSA-2007:226
http://www.mandriva.com/security/advisories?name=MDKSA-2007:226
MDKSA-2007:232
http://www.mandriva.com/security/advisories?name=MDKSA-2007:232
RHSA-2007:0993
http://www.redhat.com/support/errata/RHSA-2007-0993.html
RHSA-2007:1104
http://www.redhat.com/support/errata/RHSA-2007-1104.html
SUSE-SA:2007:059
http://www.novell.com/linux/security/advisories/2007_59_kernel.html
USN-574-1
http://www.ubuntu.com/usn/usn-574-1
ftp://ftp.kernel.org/pub/linux/kernel/people/bunk/linux-2.6.16.y/testing/ChangeLog-2.6.16.57-rc1
http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git%3Ba=commitdiff%3Bh=04045f98e0457aba7d4e6736f37eed189c48a5f7
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23
kernel-ieee80211-dos(38247)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38247
oval:org.mitre.oval:def:10596
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10596
Common Vulnerability Exposure (CVE) ID: CVE-2007-5093
20070902 Oops in pwc v4l driver
http://marc.info/?l=linux-kernel&m=118873457814808&w=2
20070903 Re: Oops in pwc v4l driver
http://marc.info/?l=linux-kernel&m=118880154122548&w=2
25504
http://www.securityfocus.com/bid/25504
30294
http://secunia.com/advisories/30294
32799
http://secunia.com/advisories/32799
DSA-1503
http://www.debian.org/security/2008/dsa-1503
RHSA-2008:0275
http://www.redhat.com/support/errata/RHSA-2008-0275.html
RHSA-2008:0972
http://rhn.redhat.com/errata/RHSA-2008-0972.html
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.6
oval:org.mitre.oval:def:10494
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10494
Common Vulnerability Exposure (CVE) ID: CVE-2008-1375
1019959
http://www.securitytracker.com/id?1019959
20080502 rPSA-2008-0157-1 kernel
http://www.securityfocus.com/archive/1/491566/100/0/threaded
20080507 rPSA-2008-0157-1 kernel
http://www.securityfocus.com/archive/1/491732/100/0/threaded
29003
http://www.securityfocus.com/bid/29003
30017
http://secunia.com/advisories/30017
30018
http://secunia.com/advisories/30018
30044
http://secunia.com/advisories/30044
30108
http://secunia.com/advisories/30108
30110
http://secunia.com/advisories/30110
30112
http://secunia.com/advisories/30112
30116
http://secunia.com/advisories/30116
30260
http://secunia.com/advisories/30260
30515
http://secunia.com/advisories/30515
30769
http://secunia.com/advisories/30769
30818
http://secunia.com/advisories/30818
30890
http://secunia.com/advisories/30890
30962
http://secunia.com/advisories/30962
31246
http://secunia.com/advisories/31246
ADV-2008-1406
http://www.vupen.com/english/advisories/2008/1406/references
ADV-2008-1452
http://www.vupen.com/english/advisories/2008/1452/references
ADV-2008-2222
http://www.vupen.com/english/advisories/2008/2222/references
DSA-1565
http://www.debian.org/security/2008/dsa-1565
FEDORA-2008-3873
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00232.html
MDVSA-2008:104
http://www.mandriva.com/security/advisories?name=MDVSA-2008:104
MDVSA-2008:167
http://www.mandriva.com/security/advisories?name=MDVSA-2008:167
RHSA-2008:0211
http://www.redhat.com/support/errata/RHSA-2008-0211.html
RHSA-2008:0233
http://www.redhat.com/support/errata/RHSA-2008-0233.html
RHSA-2008:0237
http://www.redhat.com/support/errata/RHSA-2008-0237.html
SUSE-SA:2008:030
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
SUSE-SA:2008:031
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
SUSE-SA:2008:032
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
USN-614-1
https://usn.ubuntu.com/614-1/
USN-618-1
http://www.ubuntu.com/usn/usn-618-1
[Security-announce] 20080728 VMSA-2008-00011 Updated ESX service console packages for Samba and vmnix
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
[linux-kernel] 20080501 Linux 2.6.24.6
http://marc.info/?l=linux-kernel&m=120967963803205&w=2
[linux-kernel] 20080501 Linux 2.6.25.1
http://marc.info/?l=linux-kernel&m=120967964303224&w=2
http://wiki.rpath.com/Advisories:rPSA-2008-0157
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0157
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.4
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.6
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1
https://issues.rpath.com/browse/RPL-2501
linux-kernel-dnotify-privilege-escalation(42131)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42131
oval:org.mitre.oval:def:11843
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11843
Common Vulnerability Exposure (CVE) ID: CVE-2008-1669
1019974
http://www.securitytracker.com/id?1019974
20080507 rPSA-2008-0162-1 kernel
http://www.securityfocus.com/archive/1/491740/100/0/threaded
29076
http://www.securityfocus.com/bid/29076
30077
http://secunia.com/advisories/30077
30101
http://secunia.com/advisories/30101
30164
http://secunia.com/advisories/30164
30252
http://secunia.com/advisories/30252
30276
http://secunia.com/advisories/30276
30982
http://secunia.com/advisories/30982
ADV-2008-1451
http://www.vupen.com/english/advisories/2008/1451/references
DSA-1575
http://www.debian.org/security/2008/dsa-1575
FEDORA-2008-3949
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00294.html
FEDORA-2008-4043
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00357.html
SUSE-SA:2008:035
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
SUSE-SA:2008:038
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0162
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.2
https://issues.rpath.com/browse/RPL-2518
linux-kernel-fcntlsetlk-dos(42242)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42242
oval:org.mitre.oval:def:10065
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10065
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.