![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59610 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 6 FEDORA-2007-714 (kernel) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to kernel announced via advisory FEDORA-2007-714. The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. Update Information: Update to Linux 2.6.22.8 and 2.6.22.9: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.8 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.9 CVE-2007-4571 The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc. Additional fixes: Revert to the old RTC driver (#265721, #284191) Disable NCQ for additional SATA drives. libata pata_sis: DMA fixes (#202291) libata sata_sil24: IRQ clearing race fixes net driver r8169: fix hanging (#252955, #292161) qdisc sfq: fix oops with 2 packet queue (#219895) ACPI: disable processor C-states suring suspend ACPI: silence noisy message * Thu Sep 27 2007 Chuck Ebbert - Revert to old RTC driver. - Zero fill environment for uevent handlers. - Update the libata NCQ disk blacklist. * Thu Sep 27 2007 Chuck Ebbert - libata pata_sis: DMA fixes (#202291) - libata sata_sil24: IRQ clearing race fixes - net driver r8169: fix hanging (#252955, #292161) - qdisc sfq: fix oops with 2 packet queue (#219895) - ACPI: disable processor C-states suring suspend - ACPI: silence noisy message * Wed Sep 26 2007 Chuck Ebbert - Linux 2.6.22.9 * Wed Sep 26 2007 Chuck Ebbert - Linux 2.6.22.8 Solution: Apply the appropriate updates. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ This update can be installed with the 'yum' update program. Use 'yum update package-name' at the command line. For more information, refer to 'Managing Software with yum,' available at http://fedora.redhat.com/docs/yum/. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-714 Risk factor : Medium CVSS Score: 2.1 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-4571 1018734 http://www.securitytracker.com/id?1018734 20070925 Linux Kernel ALSA snd_mem_proc_read Information Disclosure Vulnerability http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=600 25807 http://www.securityfocus.com/bid/25807 26918 http://secunia.com/advisories/26918 26980 http://secunia.com/advisories/26980 26989 http://secunia.com/advisories/26989 27101 http://secunia.com/advisories/27101 27227 http://secunia.com/advisories/27227 27436 http://secunia.com/advisories/27436 27747 http://secunia.com/advisories/27747 27824 http://secunia.com/advisories/27824 28626 http://secunia.com/advisories/28626 29054 http://secunia.com/advisories/29054 30769 http://secunia.com/advisories/30769 ADV-2007-3272 http://www.vupen.com/english/advisories/2007/3272 DSA-1479 http://www.debian.org/security/2008/dsa-1479 DSA-1505 http://www.debian.org/security/2008/dsa-1505 FEDORA-2007-2349 https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00436.html FEDORA-2007-714 https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00083.html RHSA-2007:0939 http://www.redhat.com/support/errata/RHSA-2007-0939.html RHSA-2007:0993 http://www.redhat.com/support/errata/RHSA-2007-0993.html SUSE-SA:2007:053 http://www.novell.com/linux/security/advisories/2007_53_kernel.html USN-618-1 http://www.ubuntu.com/usn/usn-618-1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccec6e2c4a74adf76ed4e2478091a311b1806212 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.8 http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm https://issues.rpath.com/browse/RPL-1761 linux-sndpagealloc-information-disclosure(36780) https://exchange.xforce.ibmcloud.com/vulnerabilities/36780 oval:org.mitre.oval:def:9053 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9053 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |