Description: | Description: The remote host is missing an update to kernel announced via advisory FEDORA-2010-18983.
Update Information:
Fixes multiple security bugs. All users should update to this version.
Also fixes: - Stall on boot on some systems with TPM devices. (RHBZ#530393) - Hard lockups with Radeon RV350 devices. (RHBZ#631310)
References:
[ 1 ] Bug #651147 - CVE-2010-4157 kernel: gdth: integer overflow in ioc_general() https://bugzilla.redhat.com/show_bug.cgi?id=651147 [ 2 ] Bug #651698 - CVE-2010-4158 kernel: socket filters infoleak https://bugzilla.redhat.com/show_bug.cgi?id=651698 [ 3 ] Bug #649695 - CVE-2010-3874 kernel: CAN minor heap overflow https://bugzilla.redhat.com/show_bug.cgi?id=649695 [ 4 ] Bug #652529 - CVE-2010-4162 kernel: bio: integer overflow page count when mapping/copying user data https://bugzilla.redhat.com/show_bug.cgi?id=652529 [ 5 ] Bug #656756 - CVE-2010-4249 kernel: unix socket local dos https://bugzilla.redhat.com/show_bug.cgi?id=656756 [ 6 ] Bug #637688 - CVE-2010-2962 kernel: arbitrary kernel memory write via i915 GEM ioctl https://bugzilla.redhat.com/show_bug.cgi?id=637688 [ 7 ] Bug #642465 - CVE-2010-2963 kernel: v4l: VIDIOCSMICROCODE arbitrary write https://bugzilla.redhat.com/show_bug.cgi?id=642465 [ 8 ] Bug #639879 - CVE-2010-3698 kvm: invalid selector in fs/gs causes kernel panic https://bugzilla.redhat.com/show_bug.cgi?id=639879 [ 9 ] Bug #640036 - CVE-2010-3705 kernel: sctp memory corruption in HMAC handling https://bugzilla.redhat.com/show_bug.cgi?id=640036 [ 10 ] Bug #638478 - CVE-2010-3442 kernel: prevent heap corruption in snd_ctl_new() https://bugzilla.redhat.com/show_bug.cgi?id=638478 [ 11 ] Bug #659567 - CVE-2010-4258 kernel: failure to revert address limit override in OOPS error path https://bugzilla.redhat.com/show_bug.cgi?id=659567 [ 12 ] Bug #651671 - CVE-2010-4169 kernel: perf bug https://bugzilla.redhat.com/show_bug.cgi?id=651671
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update kernel' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2010-18983
Risk factor : Critical
CVSS Score: 8.3
|