Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2005:092

The remote host is missing updates announced in
advisory RHSA-2005:092.

The Linux kernel handles the basic functions of the operating system.

This advisory includes fixes for several security issues:

- numerous IGMP bugs
- flaw in the page fault handler code
- flaw in the handling of uselib(2) system call
- flaw affecting the OUTS instruction of the AMD64 and Intel EM64T architecture
- incorrect DMA lock check in Direct Rendering Manager
- incorrect tables sizes used in the filesystem Native Language Support
- flaw allowing users to unlock arbitrary shared memory segments
- race exposed as a result of improvements to POSIX signal and tty standards
- flaw in mlockall in 2.6.9 kernel
- multiple flaws in sg_scsi_ioctl
- missing access check regression
- abritrary kernel memory read/rwite

For details on these issues, please visit the referenced
security advisory.

All Red Hat Enterprise Linux 4 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : Critical

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-1056
XForce ISS Database: linux-i810-dma-dos(15972)
Common Vulnerability Exposure (CVE) ID: CVE-2004-1137
Bugtraq: 20041214 Linux kernel IGMP vulnerabilities (Google Search)
Bugtraq: 20041214 [USN-38-1] Linux kernel vulnerabilities (Google Search)
Conectiva Linux advisory: CLA-2005:930
SuSE Security Announcement: SUSE-SA:2004:044 (Google Search)
XForce ISS Database: linux-igmpmarksources-dos(18482)
XForce ISS Database: linux-ipmcsource-code-execution(18481)
Common Vulnerability Exposure (CVE) ID: CVE-2004-1235
BugTraq ID: 12190
Bugtraq: 20050107 Linux kernel sys_uselib local root vulnerability (Google Search)
Debian Security Information: DSA-1067 (Google Search)
Debian Security Information: DSA-1069 (Google Search)
Debian Security Information: DSA-1070 (Google Search)
Debian Security Information: DSA-1082 (Google Search)
SuSE Security Announcement: SUSE-SR:2005:001 (Google Search)
XForce ISS Database: linux-uselib-gain-privileges(18800)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0001
BugTraq ID: 12244
Bugtraq: 20050112 Linux kernel i386 SMP page fault handler privilege escalation (Google Search)
Bugtraq: 20050114 [USN-60-0] Linux kernel vulnerabilities (Google Search)
XForce ISS Database: linux-fault-handler-gain-privileges(18849)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0090
BugTraq ID: 12599
XForce ISS Database: red-hat-regression-dos(20618)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0091
XForce ISS Database: red-hat-patch-gain-privileges(20619)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0092
XForce ISS Database: red-hat-patch-dos(20620)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0176
BugTraq ID: 12598
Bugtraq: 20050215 [USN-82-1] Linux kernel vulnerabilities (Google Search)
SGI Security Advisory: 20060402-01-U
Common Vulnerability Exposure (CVE) ID: CVE-2005-0177
Common Vulnerability Exposure (CVE) ID: CVE-2005-0178
Common Vulnerability Exposure (CVE) ID: CVE-2005-0179
Common Vulnerability Exposure (CVE) ID: CVE-2005-0180
BugTraq ID: 12198
Bugtraq: 20050107 grsecurity 2.1.0 release / 5 Linux kernel advisories (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2005-0204
CopyrightCopyright (c) 2005 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.