![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.870766 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for Red Hat Enterprise Linux 6 kernel RHSA-2012:0862-04 |
Resumen: | The remote host is missing an update for the 'Red Hat Enterprise Linux 6 kernel'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'Red Hat Enterprise Linux 6 kernel' package(s) announced via the referenced advisory. Vulnerability Insight: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * A flaw was found in the way the Linux kernel's Event Poll (epoll) subsystem handled large, nested epoll structures. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2011-1083, Moderate) * A malicious Network File System version 4 (NFSv4) server could return a crafted reply to a GETACL request, causing a denial of service on the client. (CVE-2011-4131, Moderate) Red Hat would like to thank Nelson Elhage for reporting CVE-2011-1083, and Andy Adamson for reporting CVE-2011-4131. This update also fixes several hundred bugs and adds enhancements. Refer to the Red Hat Enterprise Linux 6.3 Release Notes for information on the most significant of these changes, and the Technical Notes for further information, both linked to in the References. All Red Hat Enterprise Linux 6 users are advised to install these updated packages, which correct these issues, and fix the bugs and add the enhancements noted in the Red Hat Enterprise Linux 6.3 Release Notes and Technical Notes. The system must be rebooted for this update to take effect. Affected Software/OS: Red Hat Enterprise Linux 6 kernel on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 4.9 CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1083 43522 http://secunia.com/advisories/43522 48115 http://secunia.com/advisories/48115 48410 http://secunia.com/advisories/48410 48898 http://secunia.com/advisories/48898 48964 http://secunia.com/advisories/48964 71265 http://www.osvdb.org/71265 RHSA-2012:0862 http://rhn.redhat.com/errata/RHSA-2012-0862.html SUSE-SU-2012:0554 http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html SUSE-SU-2012:0616 http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html [linux-kernel] 20110225 [PATCH] optimize epoll loop detection http://article.gmane.org/gmane.linux.kernel/1105744 [linux-kernel] 20110226 Re: [PATCH] optimize epoll loop detection http://article.gmane.org/gmane.linux.kernel/1105888 [linux-kernel] 20110228 Re: [PATCH] optimize epoll loop detection http://article.gmane.org/gmane.linux.kernel/1106686 [oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll http://openwall.com/lists/oss-security/2011/03/02/1 [oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll http://openwall.com/lists/oss-security/2011/03/02/2 https://bugzilla.redhat.com/show_bug.cgi?id=681578 Common Vulnerability Exposure (CVE) ID: CVE-2011-4131 FEDORA-2012-8359 http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081280.html RHSA-2012:1541 http://rhn.redhat.com/errata/RHSA-2012-1541.html [oss-security] 20111111 Re: CVE Request -- kernel: nfs4_getfacl decoding kernel oops http://www.openwall.com/lists/oss-security/2011/11/12/1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bf118a342f10dafe44b14451a1392c3254629a1f http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.2 https://bugzilla.redhat.com/show_bug.cgi?id=747106 https://github.com/torvalds/linux/commit/bf118a342f10dafe44b14451a1392c3254629a1f openSUSE-SU-2013:0925 http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |