Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2008:0508

The remote host is missing updates announced in
advisory RHSA-2008:0508.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

These updated packages fix the following security issues:

* A security flaw was found in the Linux kernel memory copy routines, when
running on certain AMD64 systems. If an unsuccessful attempt to copy kernel
memory from source to destination memory locations occurred, the copy
routines did not zero the content at the destination memory location. This
could allow a local unprivileged user to view potentially sensitive data.
(CVE-2008-2729, Important)

* Alexey Dobriyan discovered a race condition in the Linux kernel
process-tracing system call, ptrace. A local unprivileged user could
use this flaw to cause a denial of service (kernel hang).
(CVE-2008-2365, Important)

* Tavis Ormandy discovered a deficiency in the Linux kernel 32-bit and
64-bit emulation. This could allow a local unprivileged user to prepare and
run a specially crafted binary, which would use this deficiency to leak
uninitialized and potentially sensitive data. (CVE-2008-0598, Important)

* It was discovered that the Linux kernel handled string operations in the
opposite way to the GNU Compiler Collection (GCC). This could allow a local
unprivileged user to cause memory corruption. (CVE-2008-1367, Low)

As well, these updated packages fix the following bug:

* On systems with a large number of CPUs (more than 16), multiple
applications calling the times() system call may have caused a system

Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : High

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-0598
BugTraq ID: 29942
Debian Security Information: DSA-1630 (Google Search)
RedHat Security Advisories: RHSA-2008:0508
SuSE Security Announcement: SUSE-SA:2008:047 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:048 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:049 (Google Search)
XForce ISS Database: linux-kernel-emulation-disclosure(43554)
Common Vulnerability Exposure (CVE) ID: CVE-2008-1367
BugTraq ID: 29084
SuSE Security Announcement: SUSE-SA:2008:030 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:031 (Google Search)
SuSE Security Announcement: SUSE-SA:2008:032 (Google Search)
XForce ISS Database: gcc-cld-dos(41340)
Common Vulnerability Exposure (CVE) ID: CVE-2008-2365
BugTraq ID: 29945
XForce ISS Database: linux-kernel-ptraceattach-dos(43567)
Common Vulnerability Exposure (CVE) ID: CVE-2008-2729
BugTraq ID: 29943
XForce ISS Database: linux-kernel-destination-info-disclosure(43558)
CopyrightCopyright (c) 2008 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.