Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2009:1081
The remote host is missing updates to kernel-rt announced in
advisory RHSA-2009:1081.

These updated packages fix the following security issues:

* a buffer overflow flaw was found in the CIFSTCon() function of the Linux
kernel Common Internet File System (CIFS) implementation. When mounting a
CIFS share, a malicious server could send an overly-long string to the
client, possibly leading to a denial of service or privilege escalation on
the client mounting the CIFS share. (CVE-2009-1439, Important)

* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)

* a deficiency was found in the Linux kernel signals implementation. The
kill_something_info() function did not check if a process was outside the
caller's namespace before sending the kill signal, making it possible to
kill processes in all process ID (PID) namespaces, breaking PID namespace
isolation. (CVE-2009-1338, Moderate)

* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)

All Red Hat Enterprise MRG users should upgrade to these updated packages,
which contain backported patches to resolve these issues. Note: The system
must be rebooted for this update to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1072
BugTraq ID: 34205
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
Debian Security Information: DSA-1800 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:021 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:028 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:031 (Google Search)
XForce ISS Database: linux-kernel-capmknod-security-bypass(49356)
Common Vulnerability Exposure (CVE) ID: CVE-2009-1192
BugTraq ID: 34673
Bugtraq: 20090516 rPSA-2009-0084-1 kernel (Google Search)
Debian Security Information: DSA-1787 (Google Search)
Debian Security Information: DSA-1794 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:032 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:054 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:056 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2009-1338
XForce ISS Database: kernel-killsomethinginfo-security-bypass(50386)
Common Vulnerability Exposure (CVE) ID: CVE-2009-1439
BugTraq ID: 34453
CopyrightCopyright (c) 2009 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.