English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 75803 Descripciones CVE y
40037 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.65812
Categoría:SuSE Local Security Checks
Título:SLES10: Security update for Linux kernel
Resumen:SLES10: Security update for Linux kernel
Descripción:The remote host is missing updates to packages that affect
the security of your system. One or more of the following packages
are affected:

kernel-bigsmp
kernel-debug
kernel-default
kernel-kdump
kernel-smp
kernel-source
kernel-syms
kernel-vmi
kernel-vmipae
kernel-xen
kernel-xenpae


More details may also be found by searching for the SuSE
Enterprise Server 10 patch database located at
http://download.novell.com/patch/finder/

Solution:

Please install the updates provided by SuSE.
Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-0675
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
http://lists.openwall.net/netdev/2009/01/28/90
http://openwall.com/lists/oss-security/2009/02/20/2
Debian Security Information: DSA-1749 (Google Search)
http://www.debian.org/security/2009/dsa-1749
Debian Security Information: DSA-1787 (Google Search)
http://www.debian.org/security/2009/dsa-1787
Debian Security Information: DSA-1794 (Google Search)
http://www.debian.org/security/2009/dsa-1794
http://www.mandriva.com/security/advisories?name=MDVSA-2009:071
http://www.redhat.com/support/errata/RHSA-2009-0360.html
http://www.redhat.com/support/errata/RHSA-2009-0326.html
SuSE Security Announcement: SUSE-SA:2009:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
http://www.ubuntu.com/usn/usn-751-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11529
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8685
http://secunia.com/advisories/33938
http://secunia.com/advisories/34394
http://secunia.com/advisories/33758
http://secunia.com/advisories/34502
http://secunia.com/advisories/34680
http://secunia.com/advisories/34981
http://secunia.com/advisories/35011
http://secunia.com/advisories/35394
http://secunia.com/advisories/37471
http://www.vupen.com/english/advisories/2009/3316
Common Vulnerability Exposure (CVE) ID: CVE-2009-0676
http://lkml.org/lkml/2009/2/12/123
http://openwall.com/lists/oss-security/2009/02/20/1
http://marc.info/?l=linux-kernel&m=123540732700371&w=2
http://www.openwall.com/lists/oss-security/2009/02/24/1
http://www.openwall.com/lists/oss-security/2009/03/02/6
RedHat Security Advisories: RHSA-2009:0459
http://rhn.redhat.com/errata/RHSA-2009-0459.html
SuSE Security Announcement: SUSE-SA:2009:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
BugTraq ID: 33846
http://www.securityfocus.com/bid/33846
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11653
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8618
http://secunia.com/advisories/34786
http://secunia.com/advisories/34962
http://secunia.com/advisories/35390
XForce ISS Database: kernel-sock-information-disclosure(48847)
http://xforce.iss.net/xforce/xfdb/48847
Common Vulnerability Exposure (CVE) ID: CVE-2009-0028
Bugtraq: 20090516 rPSA-2009-0084-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503610/100/0/threaded
http://scary.beasts.org/security/CESA-2009-002.html
http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-signal-vulnerability.html
Debian Security Information: DSA-1800 (Google Search)
http://www.debian.org/security/2009/dsa-1800
http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
http://www.redhat.com/support/errata/RHSA-2009-0451.html
SuSE Security Announcement: SUSE-SA:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html
BugTraq ID: 33906
http://www.securityfocus.com/bid/33906
http://osvdb.org/52204
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11187
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7947
http://secunia.com/advisories/34917
http://secunia.com/advisories/35121
http://secunia.com/advisories/35120
http://secunia.com/advisories/34033
Common Vulnerability Exposure (CVE) ID: CVE-2008-1294
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0
Debian Security Information: DSA-1565 (Google Search)
http://www.debian.org/security/2008/dsa-1565
http://www.redhat.com/support/errata/RHSA-2008-0612.html
http://www.ubuntu.com/usn/usn-618-1
BugTraq ID: 29004
http://www.securityfocus.com/bid/29004
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10974
http://secunia.com/advisories/30769
http://secunia.com/advisories/31341
http://secunia.com/advisories/30018
XForce ISS Database: linux-kernel-rlimitcpu-security-bypass(42145)
http://xforce.iss.net/xforce/xfdb/42145
Common Vulnerability Exposure (CVE) ID: CVE-2009-0065
http://www.openwall.com/lists/oss-security/2009/01/05/1
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01045.html
HPdes Security Advisory: HPSBNS02449
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01832118
HPdes Security Advisory: SSSRT090149
http://www.redhat.com/support/errata/RHSA-2009-0053.html
RedHat Security Advisories: RHSA-2009:0264
http://rhn.redhat.com/errata/RHSA-2009-0264.html
http://www.redhat.com/support/errata/RHSA-2009-0331.html
http://www.redhat.com/support/errata/RHSA-2009-1055.html
BugTraq ID: 33113
http://www.securityfocus.com/bid/33113
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10872
http://www.securitytracker.com/id?1022698
http://secunia.com/advisories/34252
http://secunia.com/advisories/34762
http://secunia.com/advisories/35174
http://secunia.com/advisories/36191
http://www.vupen.com/english/advisories/2009/0029
http://secunia.com/advisories/33674
http://secunia.com/advisories/33854
http://secunia.com/advisories/33858
http://www.vupen.com/english/advisories/2009/2193
Common Vulnerability Exposure (CVE) ID: CVE-2009-1046
http://lists.openwall.net/linux-kernel/2009/01/30/333
http://lists.openwall.net/linux-kernel/2009/02/02/364
http://www.openwall.com/lists/oss-security/2009/02/12/10
http://www.openwall.com/lists/oss-security/2009/02/12/11
http://www.openwall.com/lists/oss-security/2009/02/12/9
BugTraq ID: 33672
http://www.securityfocus.com/bid/33672
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 40037 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Developer APIs | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2014 E-Soft Inc. Todos los derechos reservados.