Description: | Description: The remote host is missing an update to the kernel announced via advisory FEDORA-2010-14890.
Update Information:
- Fix possible local privilege escalation on x86_64 systems (CVE-2010-3081, CVE-2010-3301). - Mitigate denial of service attack with large argument lists. - Fix possible hang on suspend introduced in 2.6.34.6-54
References:
[ 1 ] Bug #631623 - CVE-2010-3079 kernel: ftrace NULL ptr deref https://bugzilla.redhat.com/show_bug.cgi?id=631623 [ 2 ] Bug #630551 - CVE-2010-3080 kernel: /dev/sequencer open failure is not handled correctly https://bugzilla.redhat.com/show_bug.cgi?id=630551 [ 3 ] Bug #634457 - CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow https://bugzilla.redhat.com/show_bug.cgi?id=634457 [ 4 ] Bug #634449 - CVE-2010-3301 kernel: IA32 System Call Entry Point Vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=634449 [ 5 ] Bug #628770 - CVE-2010-2954 kernel: NULL deref and panic in irda https://bugzilla.redhat.com/show_bug.cgi?id=628770 [ 6 ] Bug #627440 - CVE-2010-2960 keyctl_session_to_parent NULL deref system crash https://bugzilla.redhat.com/show_bug.cgi?id=627440 [ 7 ] Bug #629441 - CVE-2010-3067 kernel: do_io_submit() issues https://bugzilla.redhat.com/show_bug.cgi?id=629441
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update kernel' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2010-14890
Risk factor : High
CVSS Score: 7.2
|