Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.63646
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2009:0360
Resumen:The remote host is missing updates announced in;advisory RHSA-2009:0360.;;The kernel-rt packages contain the Linux kernel, the core of any Linux;operating system.;;These updated packages address the following security issues:;; * a memory leak exists in keyctl handling. A local, unprivileged user could;use this flaw to deplete kernel memory, eventually leading to a denial of;service. (CVE-2009-0031, Important);; * an off-by-one underflow flaw was found in the eCryptfs subsystem. This;could potentially cause a denial of service when the readlink() function;returned an error. (CVE-2009-0269, Moderate);; * a deficiency was found in the Remote BIOS Update (RBU) driver for Dell;systems. This could allow a local, unprivileged user to cause a denial of;service by reading zero bytes from the image_type or packet_size files in;/sys/devices/platform/dell_rbu/. (CVE-2009-0322, Moderate);; * an inverted logic flaw was found in the SysKonnect FDDI PCI adapter;driver, allowing driver statistics to be reset only when the CAP_NET_ADMIN;capability was absent (local, unprivileged users could reset driver;statistics). (CVE-2009-0675, Moderate);; * the sock_getsockopt() function in the Linux kernel did not properly;initialize a data structure that can be directly returned to user-space;when the getsockopt() function is called with SO_BSDCOMPAT optname set.;This flaw could possibly lead to memory disclosure.;(CVE-2009-0676, Moderate);;For other issues addressed in this update, please visit the referenced;advisories.;;All Red Hat Enterprise MRG users should install this update which addresses;these vulnerabilities and fixes these bugs. For this update to take effect,;the system must be rebooted.
Descripción:Summary:
The remote host is missing updates announced in
advisory RHSA-2009:0360.

The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages address the following security issues:

* a memory leak exists in keyctl handling. A local, unprivileged user could
use this flaw to deplete kernel memory, eventually leading to a denial of
service. (CVE-2009-0031, Important)

* an off-by-one underflow flaw was found in the eCryptfs subsystem. This
could potentially cause a denial of service when the readlink() function
returned an error. (CVE-2009-0269, Moderate)

* a deficiency was found in the Remote BIOS Update (RBU) driver for Dell
systems. This could allow a local, unprivileged user to cause a denial of
service by reading zero bytes from the image_type or packet_size files in
/sys/devices/platform/dell_rbu/. (CVE-2009-0322, Moderate)

* an inverted logic flaw was found in the SysKonnect FDDI PCI adapter
driver, allowing driver statistics to be reset only when the CAP_NET_ADMIN
capability was absent (local, unprivileged users could reset driver
statistics). (CVE-2009-0675, Moderate)

* the sock_getsockopt() function in the Linux kernel did not properly
initialize a data structure that can be directly returned to user-space
when the getsockopt() function is called with SO_BSDCOMPAT optname set.
This flaw could possibly lead to memory disclosure.
(CVE-2009-0676, Moderate)

For other issues addressed in this update, please visit the referenced
advisories.

All Red Hat Enterprise MRG users should install this update which addresses
these vulnerabilities and fixes these bugs. For this update to take effect,
the system must be rebooted.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-0031
33858
http://secunia.com/advisories/33858
34252
http://secunia.com/advisories/34252
34394
http://secunia.com/advisories/34394
34502
http://secunia.com/advisories/34502
34762
http://secunia.com/advisories/34762
34981
http://secunia.com/advisories/34981
35011
http://secunia.com/advisories/35011
51501
http://osvdb.org/51501
DSA-1749
http://www.debian.org/security/2009/dsa-1749
DSA-1787
http://www.debian.org/security/2009/dsa-1787
DSA-1794
http://www.debian.org/security/2009/dsa-1794
RHSA-2009:0264
http://rhn.redhat.com/errata/RHSA-2009-0264.html
RHSA-2009:0331
http://www.redhat.com/support/errata/RHSA-2009-0331.html
RHSA-2009:0360
http://www.redhat.com/support/errata/RHSA-2009-0360.html
SUSE-SA:2009:010
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html
USN-751-1
http://www.ubuntu.com/usn/usn-751-1
[oss-security] 20090119 CVE-2009-0031 kernel: local denial of service in keyctl_join_session_keyring
http://www.openwall.com/lists/oss-security/2009/01/19/4
http://git2.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0d54ee1c7850a954026deec4cd4885f331da35cc
http://support.avaya.com/elmodocs2/security/ASA-2009-114.htm
oval:org.mitre.oval:def:11386
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11386
Common Vulnerability Exposure (CVE) ID: CVE-2009-0269
BugTraq ID: 33412
http://www.securityfocus.com/bid/33412
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Debian Security Information: DSA-1749 (Google Search)
Debian Security Information: DSA-1787 (Google Search)
http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
https://lists.launchpad.net/ecryptfs-devel/msg00010.html
https://lists.launchpad.net/ecryptfs-devel/msg00011.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8169
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8944
http://www.redhat.com/support/errata/RHSA-2009-0326.html
http://secunia.com/advisories/33758
http://secunia.com/advisories/35390
http://secunia.com/advisories/35394
http://secunia.com/advisories/37471
SuSE Security Announcement: SUSE-SA:2009:010 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
SuSE Security Announcement: SUSE-SA:2009:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: linux-kernel-readlink-bo(48188)
https://exchange.xforce.ibmcloud.com/vulnerabilities/48188
Common Vulnerability Exposure (CVE) ID: CVE-2009-0322
BugTraq ID: 33428
http://www.securityfocus.com/bid/33428
Debian Security Information: DSA-1794 (Google Search)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10163
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7734
http://secunia.com/advisories/33656
http://secunia.com/advisories/34680
Common Vulnerability Exposure (CVE) ID: CVE-2009-0675
http://www.mandriva.com/security/advisories?name=MDVSA-2009:071
http://lists.openwall.net/netdev/2009/01/28/90
http://openwall.com/lists/oss-security/2009/02/20/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11529
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8685
http://secunia.com/advisories/33938
Common Vulnerability Exposure (CVE) ID: CVE-2009-0676
BugTraq ID: 33846
http://www.securityfocus.com/bid/33846
http://lkml.org/lkml/2009/2/12/123
http://marc.info/?l=linux-kernel&m=123540732700371&w=2
http://openwall.com/lists/oss-security/2009/02/20/1
http://www.openwall.com/lists/oss-security/2009/02/24/1
http://www.openwall.com/lists/oss-security/2009/03/02/6
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11653
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8618
RedHat Security Advisories: RHSA-2009:0459
http://rhn.redhat.com/errata/RHSA-2009-0459.html
http://secunia.com/advisories/34786
http://secunia.com/advisories/34962
SuSE Security Announcement: SUSE-SA:2009:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
XForce ISS Database: kernel-sock-information-disclosure(48847)
https://exchange.xforce.ibmcloud.com/vulnerabilities/48847
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.