Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63287
Category:Fedora Local Security Checks
Title:Fedora Core 10 FEDORA-2009-0923 (kernel)
Summary:The remote host is missing an update to kernel;announced via advisory FEDORA-2009-0923.;Note: This VT has been deprecated and is therefore no longer functional.
Description:Summary:
The remote host is missing an update to kernel
announced via advisory FEDORA-2009-0923.
Note: This VT has been deprecated and is therefore no longer functional.

Vulnerability Insight:
Update Information:

Update to kernel 2.6.27.12.

Includes security fixes:
CVE-2009-0029 Linux Kernel insecure 64 bit system call argument passing
CVE-2009-0065 kernel: sctp: memory overflow when FWD-TSN chunk is
received with bad stream ID
Reverts ALSA driver to the version that is upstream
in kernel 2.6.27.

This should be the last 2.6.27 kernel update for
Fedora 10. A 2.6.28 update kernel is being tested.

ChangeLog:

* Tue Jan 20 2009 Chuck Ebbert

- ath5k: ignore the return value of ath5k_hw_noise_floor_calibration
(backport to 2.6.27)

- rtl8187: feedback transmitted packets using tx close descriptor for 8187B

* Tue Jan 20 2009 Chuck Ebbert 2.6.27.12-170.2.4

- Fix CVE-2009-0065: SCTP buffer overflow

* Tue Jan 20 2009 Chuck Ebbert 2.6.27.12-170.2.3

- Revert ALSA to what is upstream in 2.6.27.

* Mon Jan 19 2009 Kyle McMartin

- Linux 2.6.27.12

- linux-2.6-iwlagn-downgrade-BUG_ON-in-interrupt.patch: merged

- linux-2.6-iwlwifi-use-GFP_KERNEL-to-allocate-Rx-SKB-memory.patch: merged

* Mon Jan 19 2009 Kyle McMartin

- Roll in xen changes to execshield diff as in later kernels.

* Mon Jan 19 2009 Kyle McMartin

- execshield fixes: should no longer generate spurious handled GPFs,
fixes randomization of executables. also some clean ups.

* Sun Jan 11 2009 Dave Jones

- Don't use MAXSMP on x86-64

* Wed Jan 7 2009 Roland McGrath - 2.6.27.10-169

- utrace update

* Tue Jan 6 2009 Eric Sandeen 2.6.27.10-168

- ext4 - delay capable() checks in space accounting (#478299)

Solution:
Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update kernel' at the command line.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-0029
33275
http://www.securityfocus.com/bid/33275
33477
http://secunia.com/advisories/33477
33674
http://secunia.com/advisories/33674
34394
http://secunia.com/advisories/34394
34981
http://secunia.com/advisories/34981
35011
http://secunia.com/advisories/35011
DSA-1749
http://www.debian.org/security/2009/dsa-1749
DSA-1787
http://www.debian.org/security/2009/dsa-1787
DSA-1794
http://www.debian.org/security/2009/dsa-1794
FEDORA-2009-0816
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01045.html
MDVSA-2009:135
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135
SUSE-SA:2009:010
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html
[linux-kernel] 20090110 Re: [PATCH -v7][RFC]: mutex: implement adaptive spinning
http://marc.info/?l=linux-kernel&m=123155111608910&w=2
https://bugzilla.redhat.com/show_bug.cgi?id=479969
Common Vulnerability Exposure (CVE) ID: CVE-2009-0065
BugTraq ID: 33113
http://www.securityfocus.com/bid/33113
Debian Security Information: DSA-1749 (Google Search)
Debian Security Information: DSA-1787 (Google Search)
Debian Security Information: DSA-1794 (Google Search)
HPdes Security Advisory: HPSBNS02449
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01832118
HPdes Security Advisory: SSSRT090149
http://www.openwall.com/lists/oss-security/2009/01/05/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10872
http://www.redhat.com/support/errata/RHSA-2009-0053.html
RedHat Security Advisories: RHSA-2009:0264
http://rhn.redhat.com/errata/RHSA-2009-0264.html
http://www.redhat.com/support/errata/RHSA-2009-0331.html
http://www.redhat.com/support/errata/RHSA-2009-1055.html
http://www.securitytracker.com/id?1022698
http://secunia.com/advisories/33854
http://secunia.com/advisories/33858
http://secunia.com/advisories/34252
http://secunia.com/advisories/34680
http://secunia.com/advisories/34762
http://secunia.com/advisories/35174
http://secunia.com/advisories/35390
http://secunia.com/advisories/35394
http://secunia.com/advisories/36191
SuSE Security Announcement: SUSE-SA:2009:010 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
SuSE Security Announcement: SUSE-SA:2009:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
http://www.ubuntu.com/usn/usn-751-1
http://www.vupen.com/english/advisories/2009/0029
http://www.vupen.com/english/advisories/2009/2193
Common Vulnerability Exposure (CVE) ID: CVE-2008-5079
1021360
http://www.securitytracker.com/id?1021360
20081205 CVE-2008-5079: multiple listen()s on same socket corrupts the vcc table
http://www.securityfocus.com/archive/1/498943/100/0/threaded
20081209 rPSA-2008-0332-1 kernel
http://www.securityfocus.com/archive/1/499044/100/0/threaded
32676
http://www.securityfocus.com/bid/32676
32913
http://secunia.com/advisories/32913
33083
http://secunia.com/advisories/33083
33348
http://secunia.com/advisories/33348
33623
http://secunia.com/advisories/33623
33641
http://secunia.com/advisories/33641
33704
http://secunia.com/advisories/33704
33706
http://secunia.com/advisories/33706
33756
http://secunia.com/advisories/33756
33854
4694
http://securityreason.com/securityalert/4694
FEDORA-2008-11618
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html
MDVSA-2009:032
http://www.mandriva.com/security/advisories?name=MDVSA-2009:032
RHSA-2009:0053
RHSA-2009:0225
http://www.redhat.com/support/errata/RHSA-2009-0225.html
SUSE-SA:2009:004
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html
SUSE-SA:2009:008
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html
USN-714-1
https://usn.ubuntu.com/714-1/
USN-715-1
http://www.ubuntu.com/usn/usn-715-1
[linux-netdev] 20081204 [PATCH] ATM: CVE-2008-5079: multiple listen()s on same socket corrupts the vcc table
http://marc.info/?l=linux-netdev&m=122841256115780&w=2
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332
https://issues.rpath.com/browse/RPL-2915
oval:org.mitre.oval:def:11288
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11288
CopyrightCopyright (C) 2009 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.