English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75096 CVE descriptions
and 39644 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69684
Category:Fedora Local Security Checks
Title:Fedora Core 14 FEDORA-2011-6541 (kernel)
Summary:Fedora Core 14 FEDORA-2011-6541 (kernel)
Description:The remote host is missing an update to kernel
announced via advisory FEDORA-2011-6541.

Update Information:

Update to kernel 2.6.35.13:

http://ftp.kernel.org/pub/linux/kernel/v2.6/longterm/v2.6.35/ChangeLog-2.6.35.13

Plus additional security fixes that will appear in 2.6.35.14

References:

[ 1 ] Bug #694021 - CVE-2011-1494 CVE-2011-1495 kernel: drivers/scsi/mpt2sas: prevent heap overflows
https://bugzilla.redhat.com/show_bug.cgi?id=694021
[ 2 ] Bug #691270 - CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse
https://bugzilla.redhat.com/show_bug.cgi?id=691270
[ 3 ] Bug #681260 - CVE-2011-1079 kernel: bnep device field missing NULL terminator
https://bugzilla.redhat.com/show_bug.cgi?id=681260
[ 4 ] Bug #698996 - CVE-2011-1745 kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls
https://bugzilla.redhat.com/show_bug.cgi?id=698996
[ 5 ] Bug #698998 - CVE-2011-1746 kernel: agp: insufficient page_count parameter checking in agp_allocate_memory()
https://bugzilla.redhat.com/show_bug.cgi?id=698998

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update kernel' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-6541

Risk factor : High
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1494
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
http://www.securityfocus.com/archive/1/archive/1/520102/100/0/threaded
http://lkml.org/lkml/2011/4/5/327
http://openwall.com/lists/oss-security/2011/04/05/32
http://openwall.com/lists/oss-security/2011/04/06/2
RedHat Security Advisories: RHSA-2011:0833
http://rhn.redhat.com/errata/RHSA-2011-0833.html
http://secunia.com/advisories/46397
Common Vulnerability Exposure (CVE) ID: CVE-2011-1495
Common Vulnerability Exposure (CVE) ID: CVE-2011-1745
https://lkml.org/lkml/2011/4/14/293
http://openwall.com/lists/oss-security/2011/04/21/4
http://openwall.com/lists/oss-security/2011/04/22/7
RedHat Security Advisories: RHSA-2011:0927
http://rhn.redhat.com/errata/RHSA-2011-0927.html
BugTraq ID: 47534
http://www.securityfocus.com/bid/47534
Common Vulnerability Exposure (CVE) ID: CVE-2011-1746
https://lkml.org/lkml/2011/4/14/294
https://lkml.org/lkml/2011/4/19/400
BugTraq ID: 47535
http://www.securityfocus.com/bid/47535
Common Vulnerability Exposure (CVE) ID: CVE-2010-4668
http://lkml.org/lkml/2010/11/29/70
http://lkml.org/lkml/2010/11/29/68
http://openwall.com/lists/oss-security/2010/11/29/1
http://openwall.com/lists/oss-security/2010/11/30/4
http://openwall.com/lists/oss-security/2010/11/30/7
http://www.redhat.com/support/errata/RHSA-2011-0007.html
BugTraq ID: 45660
http://www.securityfocus.com/bid/45660
http://secunia.com/advisories/42890
XForce ISS Database: linux-blkrqmapuseriov-dos(64496)
http://xforce.iss.net/xforce/xfdb/64496
Common Vulnerability Exposure (CVE) ID: CVE-2010-4073
http://lkml.org/lkml/2010/10/6/492
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://www.openwall.com/lists/oss-security/2010/10/25/3
Debian Security Information: DSA-2126 (Google Search)
http://www.debian.org/security/2010/dsa-2126
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
http://www.redhat.com/support/errata/RHSA-2010-0958.html
http://www.redhat.com/support/errata/RHSA-2011-0162.html
http://www.redhat.com/support/errata/RHSA-2011-0017.html
SuSE Security Announcement: SUSE-SA:2011:001 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SuSE Security Announcement: SUSE-SA:2010:060 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SuSE Security Announcement: SUSE-SA:2011:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
SuSE Security Announcement: SUSE-SA:2011:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
SuSE Security Announcement: SUSE-SA:2011:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
BugTraq ID: 45073
http://www.securityfocus.com/bid/45073
http://secunia.com/advisories/42778
http://secunia.com/advisories/42932
http://secunia.com/advisories/42963
http://secunia.com/advisories/42884
http://secunia.com/advisories/43291
http://securityreason.com/securityalert/8366
http://www.vupen.com/english/advisories/2011/0012
http://www.vupen.com/english/advisories/2011/0124
http://www.vupen.com/english/advisories/2011/0168
http://www.vupen.com/english/advisories/2011/0298
http://www.vupen.com/english/advisories/2011/0375
Common Vulnerability Exposure (CVE) ID: CVE-2010-4072
http://lkml.org/lkml/2010/10/6/454
http://www.ubuntu.com/usn/USN-1041-1
http://www.ubuntu.com/usn/USN-1057-1
BugTraq ID: 45054
http://www.securityfocus.com/bid/45054
http://secunia.com/advisories/42758
http://secunia.com/advisories/43161
http://www.vupen.com/english/advisories/2011/0070
http://www.vupen.com/english/advisories/2011/0280
Common Vulnerability Exposure (CVE) ID: CVE-2010-3880
http://www.spinics.net/lists/netdev/msg145899.html
http://openwall.com/lists/oss-security/2010/11/04/9
http://openwall.com/lists/oss-security/2010/11/05/3
http://www.redhat.com/support/errata/RHSA-2011-0004.html
BugTraq ID: 44665
http://www.securityfocus.com/bid/44665
http://secunia.com/advisories/42126
http://secunia.com/advisories/42789
http://www.vupen.com/english/advisories/2011/0024
Common Vulnerability Exposure (CVE) ID: CVE-2010-2962
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
http://www.redhat.com/support/errata/RHSA-2010-0842.html
SuSE Security Announcement: SUSE-SA:2010:050 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html
SuSE Security Announcement: SUSE-SA:2010:051 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html
BugTraq ID: 44067
http://www.securityfocus.com/bid/44067
http://secunia.com/advisories/42745
http://www.vupen.com/english/advisories/2010/3321
Common Vulnerability Exposure (CVE) ID: CVE-2010-3698
http://www.redhat.com/support/errata/RHSA-2010-0898.html
BugTraq ID: 44500
http://www.securityfocus.com/bid/44500
http://www.vupen.com/english/advisories/2010/3123
Common Vulnerability Exposure (CVE) ID: CVE-2010-2963
http://www.outflux.net/blog/archives/2010/10/19/cve-2010-2963-v4l-compat-exploit/
http://www.mandriva.com/security/advisories?name=MDVSA-2010:257
SuSE Security Announcement: SUSE-SA:2010:053 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html
SuSE Security Announcement: SUSE-SA:2010:057 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
http://www.ubuntu.com/usn/USN-1000-1
BugTraq ID: 44242
http://www.securityfocus.com/bid/44242
http://www.securitytracker.com/id?1024710
Common Vulnerability Exposure (CVE) ID: CVE-2010-3904
http://www.vsecurity.com/download/tools/linux-rds-exploit.c
http://www.vsecurity.com/resources/advisory/20101019-1/
http://www.redhat.com/support/errata/RHSA-2010-0792.html
CERT/CC vulnerability note: VU#362983
http://www.kb.cert.org/vuls/id/362983
http://securitytracker.com/id?1024613
Common Vulnerability Exposure (CVE) ID: CVE-2011-1478
http://openwall.com/lists/oss-security/2011/03/28/1
http://securityreason.com/securityalert/8480
Common Vulnerability Exposure (CVE) ID: CVE-2011-1079
http://www.openwall.com/lists/oss-security/2011/03/01/10
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.