Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.67795
Category:Fedora Local Security Checks
Title:Fedora Core 12 FEDORA-2010-11412 (kernel)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to kernel
announced via advisory FEDORA-2010-11412.

References:

[ 1 ] Bug #601006 - CVE-2010-2066 kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files
https://bugzilla.redhat.com/show_bug.cgi?id=601006
[ 2 ] Bug #612166 - CVE-2010-2524 kernel: dns_resolver upcall security issue
https://bugzilla.redhat.com/show_bug.cgi?id=612166

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update kernel' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-11412

Risk factor : High

CVSS Score:
7.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-2066
20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
http://www.securityfocus.com/archive/1/516397/100/0/threaded
43315
http://secunia.com/advisories/43315
RHSA-2010:0610
http://www.redhat.com/support/errata/RHSA-2010-0610.html
SUSE-SA:2010:033
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html
USN-1000-1
http://www.ubuntu.com/usn/USN-1000-1
[oss-security] 20100607 CVE request - kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files
http://www.openwall.com/lists/oss-security/2010/06/07/1
[oss-security] 20100609 Re: CVE request - kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files
http://www.openwall.com/lists/oss-security/2010/06/09/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
https://bugzilla.redhat.com/show_bug.cgi?id=601006
Common Vulnerability Exposure (CVE) ID: CVE-2010-2524
MDVSA-2010:172
http://www.mandriva.com/security/advisories?name=MDVSA-2010:172
SUSE-SA:2010:040
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
[oss-security] 20100802 CVE-2010-2524 kernel: dns_resolver upcall security issue
http://marc.info/?l=oss-security&m=128072090331700&w=2
[oss-security] 20100802 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue
http://marc.info/?l=oss-security&m=128078387328921&w=2
[oss-security] 20100803 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue
http://marc.info/?l=oss-security&m=128080755321157&w=2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7
https://bugzilla.redhat.com/show_bug.cgi?id=612166
Common Vulnerability Exposure (CVE) ID: CVE-2010-2478
41223
http://www.securityfocus.com/bid/41223
[netdev] 20100628 [PATCH net-2.6 1/2] ethtool: Fix potential kernel buffer overflow in ETHTOOL_GRXCLSRLALL
http://article.gmane.org/gmane.linux.network/164869
[oss-security] 20100629 Re: kernel: ethtool: kernel buffer overflow in ETHTOOL_GRXCLSRLALL
http://www.openwall.com/lists/oss-security/2010/06/29/3
[oss-security] 20100629 kernel: ethtool: kernel buffer overflow in ETHTOOL_GRXCLSRLALL
http://www.openwall.com/lists/oss-security/2010/06/29/1
[oss-security] 20100630 Re: kernel: ethtool: kernel buffer overflow in ETHTOOL_GRXCLSRLALL
http://www.openwall.com/lists/oss-security/2010/06/30/17
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db048b69037e7fa6a7d9e95a1271a50dc08ae233
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33.7
https://bugzilla.redhat.com/show_bug.cgi?id=608950
Common Vulnerability Exposure (CVE) ID: CVE-2010-2071
[linux-kernel] 20100518 [PATCH] btrfs: should add a permission check for setfacl
http://lkml.org/lkml/2010/5/17/544
[oss-security] 20100611 CVE request - kernel: btrfs: prevent users from setting ACLs on files they do not own
http://www.openwall.com/lists/oss-security/2010/06/11/3
[oss-security] 20100614 Re: CVE request - kernel: btrfs: prevent users from setting ACLs on files they do not own
http://www.openwall.com/lists/oss-security/2010/06/14/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=2f26afba
Common Vulnerability Exposure (CVE) ID: CVE-2010-1437
39719
http://www.securityfocus.com/bid/39719
39830
http://secunia.com/advisories/39830
40218
http://secunia.com/advisories/40218
40645
http://secunia.com/advisories/40645
ADV-2010-1857
http://www.vupen.com/english/advisories/2010/1857
DSA-2053
http://www.debian.org/security/2010/dsa-2053
RHSA-2010:0474
http://www.redhat.com/support/errata/RHSA-2010-0474.html
SUSE-SA:2010:031
http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html
[linux-kernel] 20100422 [PATCH 0/1][BUG][IMPORTANT] KEYRINGS: find_keyring_by_name() can gain the freed keyring
http://marc.info/?l=linux-kernel&m=127192182917857&w=2
[linux-kernel] 20100430 [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring
http://marc.info/?l=linux-kernel&m=127274294622730&w=2
[linux-kernel] 20100503 Re: [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring
http://marc.info/?l=linux-kernel&m=127292492727029&w=2
[oss-security] 20100427 CVE request - kernel: find_keyring_by_name() can gain the freed keyring
http://www.openwall.com/lists/oss-security/2010/04/27/2
[oss-security] 20100427 Re: CVE request - kernel: find_keyring_by_name() can gain the freed keyring
http://www.openwall.com/lists/oss-security/2010/04/28/2
https://bugzilla.redhat.com/show_bug.cgi?id=585094
https://patchwork.kernel.org/patch/94038/
https://patchwork.kernel.org/patch/94664/
kernel-findkeyringbyname-dos(58254)
https://exchange.xforce.ibmcloud.com/vulnerabilities/58254
oval:org.mitre.oval:def:9715
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9715
Common Vulnerability Exposure (CVE) ID: CVE-2010-1146
12130
http://www.exploit-db.com/exploits/12130
39316
http://secunia.com/advisories/39316
39344
http://www.securityfocus.com/bid/39344
63601
http://osvdb.org/63601
[linux-kernel] 20100408 [PATCH #3] reiserfs: Fix permissions on .reiserfs_priv
http://marc.info/?l=linux-kernel&m=127076012022155&w=2
https://bugzilla.redhat.com/show_bug.cgi?id=568041
kernel-reiserfs-privilege-escalation(57782)
https://exchange.xforce.ibmcloud.com/vulnerabilities/57782
Common Vulnerability Exposure (CVE) ID: CVE-2010-0623
http://www.mandriva.com/security/advisories?name=MDVSA-2010:088
http://www.openwall.com/lists/oss-security/2010/02/11/2
http://secunia.com/advisories/38922
SuSE Security Announcement: SUSE-SA:2010:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00006.html
http://www.ubuntu.com/usn/USN-914-1
http://www.vupen.com/english/advisories/2010/0638
Common Vulnerability Exposure (CVE) ID: CVE-2009-4537
BugTraq ID: 37521
http://www.securityfocus.com/bid/37521
Debian Security Information: DSA-2053 (Google Search)
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html
http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/
http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html
http://twitter.com/dakami/statuses/7104238406
http://marc.info/?l=linux-netdev&m=126202972828626&w=2
http://www.openwall.com/lists/oss-security/2009/12/28/1
http://www.openwall.com/lists/oss-security/2009/12/29/2
http://www.openwall.com/lists/oss-security/2009/12/31/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7443
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9439
http://www.redhat.com/support/errata/RHSA-2010-0019.html
http://www.redhat.com/support/errata/RHSA-2010-0020.html
http://www.redhat.com/support/errata/RHSA-2010-0041.html
http://www.redhat.com/support/errata/RHSA-2010-0053.html
RedHat Security Advisories: RHSA-2010:0095
https://rhn.redhat.com/errata/RHSA-2010-0095.html
http://www.redhat.com/support/errata/RHSA-2010-0111.html
http://securitytracker.com/id?1023419
http://secunia.com/advisories/38031
http://secunia.com/advisories/38610
http://secunia.com/advisories/39742
SuSE Security Announcement: SUSE-SA:2010:023 (Google Search)
http://www.novell.com/linux/security/advisories/2010_23_kernel.html
SuSE Security Announcement: SUSE-SA:2010:031 (Google Search)
XForce ISS Database: kernel-r8169-dos(55647)
https://exchange.xforce.ibmcloud.com/vulnerabilities/55647
Common Vulnerability Exposure (CVE) ID: CVE-2009-4131
37277
http://www.securityfocus.com/bid/37277
37658
http://secunia.com/advisories/37658
37686
http://secunia.com/advisories/37686
38017
http://secunia.com/advisories/38017
ADV-2009-3468
http://www.vupen.com/english/advisories/2009/3468
FEDORA-2009-13039
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00702.html
MDVSA-2009:329
http://www.mandriva.com/security/advisories?name=MDVSA-2009:329
SUSE-SA:2010:001
http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
USN-869-1
http://www.ubuntu.com/usn/USN-869-1
[linux-kernel] 20091209 [GIT PULL] ext4 updates for v2.6.33
http://lkml.org/lkml/2009/12/9/255
http://git.kernel.org/?p=linux/kernel/git/tytso/ext4.git%3Ba=commit%3Bh=4a58579b9e4e2a35d57e6c9c8483e52f6f1b7fd6
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.32-git6.log
http://www.theregister.co.uk/2009/12/11/linux_kernel_bugs_patched/
https://bugzilla.redhat.com/show_bug.cgi?id=544471
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.