![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.68719 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2011:0028 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory RHSA-2011:0028. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel. A data structure field in kvm_vcpu_ioctl_x86_get_vcpu_events() in QEMU-KVM was not initialized properly before being copied to user-space. A privileged host user with access to /dev/kvm could use this flaw to leak kernel stack memory to user-space. (CVE-2010-4525) Red Hat would like to thank Stephan Mueller of atsec information security for reporting this issue. These updated packages also fix several bugs. Documentation for these bug fixes will be available shortly in the kvm section of the Red Hat Enterprise Linux 5.6 Technical Notes, linked to in the References. All KVM users should upgrade to these updated packages, which resolve this issue as well as fixing the bugs noted in the Technical Notes. Note: The procedure in the Solution section must be performed before this update will take effect. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2011-0028.html http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.6_Technical_Notes/index.html Risk factor : Low CVSS Score: 1.9 |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-4525 42890 http://secunia.com/advisories/42890 45676 http://www.securityfocus.com/bid/45676 70377 http://osvdb.org/70377 ADV-2011-0123 http://www.vupen.com/english/advisories/2011/0123 RHSA-2011:0007 http://www.redhat.com/support/errata/RHSA-2011-0007.html RHSA-2011:0028 http://www.redhat.com/support/errata/RHSA-2011-0028.html [oss-security] 20110105 CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak http://www.openwall.com/lists/oss-security/2011/01/05/1 [oss-security] 20110105 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak http://www.openwall.com/lists/oss-security/2011/01/05/9 [oss-security] 20110106 Re: CVE-2010-4525 kvm: x86: zero kvm_vcpu_events->interrupt.pad infoleak http://www.openwall.com/lists/oss-security/2011/01/06/3 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4525 kernel-kvmvcpueventsinterrupt-info-disc(64519) https://exchange.xforce.ibmcloud.com/vulnerabilities/64519 |
Copyright | Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |