Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.67473
Category:Fedora Local Security Checks
Title:Fedora Core 12 FEDORA-2010-7779 (kernel)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to kernel
announced via advisory FEDORA-2010-7779.

Update Information:

Update to kernel 2.6.32.12:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.12
Revert ath9k: fix lockdep warning when unloading module from the 2.6.32.12 update.

References:

[ 1 ] Bug #583581 - iscsi header digest and authentication broken with 2.6.32.x kernels
https://bugzilla.redhat.com/show_bug.cgi?id=583581
[ 2 ] Bug #552257 - Process-shared futex on a huge page causes livelock
https://bugzilla.redhat.com/show_bug.cgi?id=552257
[ 3 ] Bug #568041 - CVE-2010-1146 Kernel allows access to .reiserfs_priv
https://bugzilla.redhat.com/show_bug.cgi?id=568041
[ 4 ] Bug #525966 - BCM57780 Not Detected
https://bugzilla.redhat.com/show_bug.cgi?id=525966
[ 5 ] Bug #575402 - mdraid check causes data read corruption, massive CPU load, 100+ async processes
https://bugzilla.redhat.com/show_bug.cgi?id=575402
[ 6 ] Bug #532161 - Wrong ACPI temperature after suspend/resume
https://bugzilla.redhat.com/show_bug.cgi?id=532161

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update kernel' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-7779

Risk factor : High

CVSS Score:
7.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-1146
12130
http://www.exploit-db.com/exploits/12130
39316
http://secunia.com/advisories/39316
39344
http://www.securityfocus.com/bid/39344
63601
http://osvdb.org/63601
[linux-kernel] 20100408 [PATCH #3] reiserfs: Fix permissions on .reiserfs_priv
http://marc.info/?l=linux-kernel&m=127076012022155&w=2
https://bugzilla.redhat.com/show_bug.cgi?id=568041
kernel-reiserfs-privilege-escalation(57782)
https://exchange.xforce.ibmcloud.com/vulnerabilities/57782
Common Vulnerability Exposure (CVE) ID: CVE-2010-0623
http://www.mandriva.com/security/advisories?name=MDVSA-2010:088
http://www.openwall.com/lists/oss-security/2010/02/11/2
http://secunia.com/advisories/38922
SuSE Security Announcement: SUSE-SA:2010:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00006.html
http://www.ubuntu.com/usn/USN-914-1
http://www.vupen.com/english/advisories/2010/0638
Common Vulnerability Exposure (CVE) ID: CVE-2009-4537
BugTraq ID: 37521
http://www.securityfocus.com/bid/37521
Debian Security Information: DSA-2053 (Google Search)
http://www.debian.org/security/2010/dsa-2053
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html
http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/
http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html
http://twitter.com/dakami/statuses/7104238406
http://marc.info/?l=linux-netdev&m=126202972828626&w=2
http://www.openwall.com/lists/oss-security/2009/12/28/1
http://www.openwall.com/lists/oss-security/2009/12/29/2
http://www.openwall.com/lists/oss-security/2009/12/31/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7443
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9439
http://www.redhat.com/support/errata/RHSA-2010-0019.html
http://www.redhat.com/support/errata/RHSA-2010-0020.html
http://www.redhat.com/support/errata/RHSA-2010-0041.html
http://www.redhat.com/support/errata/RHSA-2010-0053.html
RedHat Security Advisories: RHSA-2010:0095
https://rhn.redhat.com/errata/RHSA-2010-0095.html
http://www.redhat.com/support/errata/RHSA-2010-0111.html
http://securitytracker.com/id?1023419
http://secunia.com/advisories/38031
http://secunia.com/advisories/38610
http://secunia.com/advisories/39742
http://secunia.com/advisories/39830
http://secunia.com/advisories/40645
SuSE Security Announcement: SUSE-SA:2010:023 (Google Search)
http://www.novell.com/linux/security/advisories/2010_23_kernel.html
SuSE Security Announcement: SUSE-SA:2010:031 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html
http://www.vupen.com/english/advisories/2010/1857
XForce ISS Database: kernel-r8169-dos(55647)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55647
Common Vulnerability Exposure (CVE) ID: CVE-2009-4131
37277
http://www.securityfocus.com/bid/37277
37658
http://secunia.com/advisories/37658
37686
http://secunia.com/advisories/37686
38017
http://secunia.com/advisories/38017
ADV-2009-3468
http://www.vupen.com/english/advisories/2009/3468
FEDORA-2009-13039
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00702.html
MDVSA-2009:329
http://www.mandriva.com/security/advisories?name=MDVSA-2009:329
SUSE-SA:2010:001
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
USN-869-1
http://www.ubuntu.com/usn/USN-869-1
[linux-kernel] 20091209 [GIT PULL] ext4 updates for v2.6.33
http://lkml.org/lkml/2009/12/9/255
http://git.kernel.org/?p=linux/kernel/git/tytso/ext4.git%3Ba=commit%3Bh=4a58579b9e4e2a35d57e6c9c8483e52f6f1b7fd6
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.32-git6.log
http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/
https://bugzilla.redhat.com/show_bug.cgi?id=544471
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.