Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64551
Category:Fedora Local Security Checks
Title:Fedora Core 10 FEDORA-2009-8264 (kernel)
Summary:The remote host is missing an update to kernel;announced via advisory FEDORA-2009-8264.;Note: This VT has been deprecated and is therefore no longer functional.
Description:Summary:
The remote host is missing an update to kernel
announced via advisory FEDORA-2009-8264.
Note: This VT has been deprecated and is therefore no longer functional.

Vulnerability Insight:
Update Information:

Update to linux kernel 2.6.27.29

Fixes security bugs: CVE-2009-1895 CVE-2009-2406 CVE-2009-2407

ChangeLog:

* Fri Jul 31 2009 Chuck Ebbert 2.6.27.29-170.2.78

- The kernel package needs to override the new rpm %install behavior.

* Thu Jul 30 2009 Chuck Ebbert 2.6.27.29-170.2.77

- Linux 2.6.27.29

* Wed Jul 29 2009 Chuck Ebbert 2.6.27.29-170.2.75.rc1

- Linux 2.6.27.29-rc1 (CVE-2009-2406, CVE-2009-2407)

- Drop linux-2.6-netdev-r8169-avoid-losing-msi-interrupts.patch, now in -stable.

* Wed Jul 29 2009 Chuck Ebbert 2.6.27.28-170.2.74

- Don't bounce virtio_blk requests (#510304)

* Mon Jul 27 2009 Chuck Ebbert 2.6.27.28-170.2.73

- Linux 2.6.27.28 (CVE-2009-1895, CVE-2009-1897)
Dropped patches, merged in stable:
linux-2.6-kbuild-fix-unifdef.c-usage-of-getline.patch
linux-2.6-netdev-r8169-fix-lg-pkt-crash.patch
New config item:
CONFIG_DEFAULT_MMAP_MIN_ADDR=32768

Solution:
Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update kernel' at the command line.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1895
20090724 rPSA-2009-0111-1 kernel
http://www.securityfocus.com/archive/1/505254/100/0/threaded
20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
http://www.securityfocus.com/archive/1/507985/100/0/threaded
20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel
http://www.securityfocus.com/archive/1/512019/100/0/threaded
35647
http://www.securityfocus.com/bid/35647
35801
http://secunia.com/advisories/35801
36045
http://secunia.com/advisories/36045
36051
http://secunia.com/advisories/36051
36054
http://secunia.com/advisories/36054
36116
http://secunia.com/advisories/36116
36131
http://secunia.com/advisories/36131
36759
http://secunia.com/advisories/36759
37471
http://secunia.com/advisories/37471
55807
http://www.osvdb.org/55807
ADV-2009-1866
http://www.vupen.com/english/advisories/2009/1866
ADV-2009-3316
http://www.vupen.com/english/advisories/2009/3316
DSA-1844
http://www.debian.org/security/2009/dsa-1844
DSA-1845
http://www.debian.org/security/2009/dsa-1845
FEDORA-2009-8144
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00223.html
FEDORA-2009-8264
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00166.html
MDVSA-2011:051
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
RHSA-2009:1193
http://www.redhat.com/support/errata/RHSA-2009-1193.html
RHSA-2009:1438
http://www.redhat.com/support/errata/RHSA-2009-1438.html
RHSA-2009:1540
https://rhn.redhat.com/errata/RHSA-2009-1540.html
RHSA-2009:1550
https://rhn.redhat.com/errata/RHSA-2009-1550.html
USN-807-1
http://www.ubuntu.com/usn/usn-807-1
http://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f9fabcb58a6d26d6efde842d1703ac7cfa9427b6
http://patchwork.kernel.org/patch/32598/
http://wiki.rpath.com/Advisories:rPSA-2009-0111
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc3
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
https://bugs.launchpad.net/bugs/cve/2009-1895
oval:org.mitre.oval:def:11768
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11768
oval:org.mitre.oval:def:7826
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7826
oval:org.mitre.oval:def:9453
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9453
Common Vulnerability Exposure (CVE) ID: CVE-2009-2406
1022663
http://www.securitytracker.com/id?1022663
20090728 [RISE-2009002] Linux eCryptfs parse_tag_11_packet Literal Data Buffer Overflow Vulnerability
http://www.securityfocus.com/archive/1/505334/100/0/threaded
35851
http://www.securityfocus.com/bid/35851
35985
http://secunia.com/advisories/35985
ADV-2009-2041
http://www.vupen.com/english/advisories/2009/2041
MDVSA-2011:029
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
SUSE-SR:2009:015
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6352a29305373ae6196491e6d4669f301e26492e
http://risesecurity.org/advisories/RISE-2009002.txt
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.4
oval:org.mitre.oval:def:10072
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10072
oval:org.mitre.oval:def:8246
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8246
Common Vulnerability Exposure (CVE) ID: CVE-2009-2407
20090728 [RISE-2009003] Linux eCryptfs parse_tag_3_packet Encrypted Key Buffer Overflow Vulnerability
http://www.securityfocus.com/archive/1/505337/100/0/threaded
35850
http://www.securityfocus.com/bid/35850
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f151cd2c54ddc7714e2f740681350476cda03a28
http://risesecurity.org/advisories/RISE-2009003.txt
oval:org.mitre.oval:def:11255
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11255
oval:org.mitre.oval:def:8057
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8057
Common Vulnerability Exposure (CVE) ID: CVE-2009-1897
20090716 Linux 2.6.30+/SELinux/RHEL5 test kernel 0day, exploiting the unexploitable
http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0241.html
20090716 Re: Linux 2.6.30+/SELinux/RHEL5 test kernel 0day, exploiting the unexploitable
http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0246.html
35839
http://secunia.com/advisories/35839
ADV-2009-1925
http://www.vupen.com/english/advisories/2009/1925
[linux-kernel] 20090706 Re: PROBLEM: tun/tap crashes if open() /dev/net/tun and then poll() it.
http://lkml.org/lkml/2009/7/6/19
[netdev] 20090409 Oops in tun: bisected to Limit amount of queued packets per device
http://article.gmane.org/gmane.linux.network/124939
[oss-security] 20090717 Linux 2.6.30+/SELinux/RHEL5 test kernel 0day, exploiting the unexploitable
http://www.openwall.com/lists/oss-security/2009/07/17/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c8a9c63d5fd738c261bd0ceece04d9c8357ca13
http://grsecurity.net/~spender/cheddar_bay.tgz
http://isc.sans.org/diary.html?storyid=6820
https://bugzilla.redhat.com/show_bug.cgi?id=512284
https://www.redhat.com/en/blog/security-flaws-caused-compiler-optimizations
linux-kernel-tunchrpoll-code-execution(51803)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51803
Common Vulnerability Exposure (CVE) ID: CVE-2009-0065
BugTraq ID: 33113
http://www.securityfocus.com/bid/33113
Debian Security Information: DSA-1749 (Google Search)
http://www.debian.org/security/2009/dsa-1749
Debian Security Information: DSA-1787 (Google Search)
http://www.debian.org/security/2009/dsa-1787
Debian Security Information: DSA-1794 (Google Search)
http://www.debian.org/security/2009/dsa-1794
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01045.html
HPdes Security Advisory: HPSBNS02449
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01832118
HPdes Security Advisory: SSSRT090149
http://www.openwall.com/lists/oss-security/2009/01/05/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10872
http://www.redhat.com/support/errata/RHSA-2009-0053.html
RedHat Security Advisories: RHSA-2009:0264
http://rhn.redhat.com/errata/RHSA-2009-0264.html
http://www.redhat.com/support/errata/RHSA-2009-0331.html
http://www.redhat.com/support/errata/RHSA-2009-1055.html
http://www.securitytracker.com/id?1022698
http://secunia.com/advisories/33674
http://secunia.com/advisories/33854
http://secunia.com/advisories/33858
http://secunia.com/advisories/34252
http://secunia.com/advisories/34394
http://secunia.com/advisories/34680
http://secunia.com/advisories/34762
http://secunia.com/advisories/34981
http://secunia.com/advisories/35011
http://secunia.com/advisories/35174
http://secunia.com/advisories/35390
http://secunia.com/advisories/35394
http://secunia.com/advisories/36191
SuSE Security Announcement: SUSE-SA:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html
SuSE Security Announcement: SUSE-SA:2009:030 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
SuSE Security Announcement: SUSE-SA:2009:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
http://www.ubuntu.com/usn/usn-751-1
http://www.vupen.com/english/advisories/2009/0029
http://www.vupen.com/english/advisories/2009/2193
Common Vulnerability Exposure (CVE) ID: CVE-2008-5079
1021360
http://www.securitytracker.com/id?1021360
20081205 CVE-2008-5079: multiple listen()s on same socket corrupts the vcc table
http://www.securityfocus.com/archive/1/498943/100/0/threaded
20081209 rPSA-2008-0332-1 kernel
http://www.securityfocus.com/archive/1/499044/100/0/threaded
32676
http://www.securityfocus.com/bid/32676
32913
http://secunia.com/advisories/32913
33083
http://secunia.com/advisories/33083
33348
http://secunia.com/advisories/33348
33623
http://secunia.com/advisories/33623
33641
http://secunia.com/advisories/33641
33704
http://secunia.com/advisories/33704
33706
http://secunia.com/advisories/33706
33756
http://secunia.com/advisories/33756
33854
34981
4694
http://securityreason.com/securityalert/4694
DSA-1787
FEDORA-2008-11618
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html
MDVSA-2009:032
http://www.mandriva.com/security/advisories?name=MDVSA-2009:032
RHSA-2009:0053
RHSA-2009:0225
http://www.redhat.com/support/errata/RHSA-2009-0225.html
SUSE-SA:2009:004
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html
SUSE-SA:2009:008
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html
SUSE-SA:2009:010
USN-714-1
https://usn.ubuntu.com/714-1/
USN-715-1
http://www.ubuntu.com/usn/usn-715-1
[linux-netdev] 20081204 [PATCH] ATM: CVE-2008-5079: multiple listen()s on same socket corrupts the vcc table
http://marc.info/?l=linux-netdev&m=122841256115780&w=2
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0332
https://issues.rpath.com/browse/RPL-2915
oval:org.mitre.oval:def:11288
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11288
CopyrightCopyright (C) 2009 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.