![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2015.0005 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2015-0005) |
Resumen: | The remote host is missing an update for the 'kmod-nvidia304, kmod-nvidia-current, nvidia304, nvidia-current' package(s) announced via the MGASA-2015-0005 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'kmod-nvidia304, kmod-nvidia-current, nvidia304, nvidia-current' package(s) announced via the MGASA-2015-0005 advisory. Vulnerability Insight: Updated nvidia304 and nvidia-current drivers fixes security issues: The NVIDIA Linux Discrete GPU drivers before R304.125, R331.x before R331.113, R340.x before R340.65, R343.x before R343.36, and R346.x before R346.22, Linux for Tegra (L4T) driver before R21.2, and Chrome OS driver before R40 allows remote attackers to cause a denial of service (segmentation fault and X server crash) or possibly execute arbitrary code via a crafted GLX indirect rendering protocol request (CVE-2014-8093, CVE-2014-8098, CVE-2014-8298). Note, the nvidia173 173.14.39 driver in Mageia 4 is also vulnerable to this issue, but as it has reached EOL upstream it won't get any fixes for this. For nvidia-cuda-toolkit, it's safe to use with the fixed nvidia304 and nvidia-current drivers released as part of this update. Affected Software/OS: 'kmod-nvidia304, kmod-nvidia-current, nvidia304, nvidia-current' package(s) on Mageia 4. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-8093 61947 http://secunia.com/advisories/61947 62292 http://secunia.com/advisories/62292 71596 http://www.securityfocus.com/bid/71596 DSA-3095 http://www.debian.org/security/2014/dsa-3095 GLSA-201504-06 https://security.gentoo.org/glsa/201504-06 MDVSA-2015:119 http://www.mandriva.com/security/advisories?name=MDVSA-2015:119 http://advisories.mageia.org/MGASA-2014-0532.html http://nvidia.custhelp.com/app/answers/detail/a_id/3610 http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/ Common Vulnerability Exposure (CVE) ID: CVE-2014-8098 71606 http://www.securityfocus.com/bid/71606 Common Vulnerability Exposure (CVE) ID: CVE-2014-8298 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |