Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2010:0076
The remote host is missing updates announced in
advisory RHSA-2010:0076.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* an array index error was found in the gdth driver in the Linux kernel. A
local user could send a specially-crafted IOCTL request that would cause a
denial of service or, possibly, privilege escalation. (CVE-2009-3080,

* a flaw was found in the collect_rx_frame() function in the HiSax ISDN
driver (hfc_usb) in the Linux kernel. An attacker could use this flaw to
send a specially-crafted HDLC packet that could trigger a buffer out of
bounds, possibly resulting in a denial of service. (CVE-2009-4005,

* permission issues were found in the megaraid_sas driver (for SAS based
RAID controllers) in the Linux kernel. The dbg_lvl and poll_mode_io
files on the sysfs file system (/sys/) had world-writable permissions.
This could allow local, unprivileged users to change the behavior of the
driver. (CVE-2009-3889, CVE-2009-3939, Moderate)

* a buffer overflow flaw was found in the hfs_bnode_read() function in the
HFS file system implementation in the Linux kernel. This could lead to a
denial of service if a user browsed a specially-crafted HFS file system,
for example, by running ls. (CVE-2009-4020, Low)

Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : High

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-3080
BugTraq ID: 37068
Debian Security Information: DSA-2005 (Google Search)
RedHat Security Advisories: RHSA-2010:0046
RedHat Security Advisories: RHSA-2010:0095
SuSE Security Announcement: SUSE-SA:2009:061 (Google Search)
SuSE Security Announcement: SUSE-SA:2009:064 (Google Search)
SuSE Security Announcement: SUSE-SA:2010:001 (Google Search)
SuSE Security Announcement: SUSE-SA:2010:005 (Google Search)
SuSE Security Announcement: SUSE-SA:2010:013 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2009-3889
BugTraq ID: 37019
Common Vulnerability Exposure (CVE) ID: CVE-2009-3939
Debian Security Information: DSA-1996 (Google Search)
SuSE Security Announcement: SUSE-SA:2010:010 (Google Search)
SuSE Security Announcement: SUSE-SA:2010:012 (Google Search)
SuSE Security Announcement: SUSE-SA:2010:014 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2009-4005
BugTraq ID: 37036
XForce ISS Database: kernel-hfcusb-privilege-escalation(54310)
Common Vulnerability Exposure (CVE) ID: CVE-2009-4020
SuSE Security Announcement: SUSE-SA:2010:019 (Google Search)
SuSE Security Announcement: SUSE-SA:2010:023 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2009-4537
BugTraq ID: 37521
Debian Security Information: DSA-2053 (Google Search)
SuSE Security Announcement: SUSE-SA:2010:031 (Google Search)
XForce ISS Database: kernel-r8169-dos(55647)
CopyrightCopyright (c) 2010 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.