Búsqueda de    
Vulnerabilidad   
    Buscar 191973 Descripciones CVE y
86218 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.69652
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2011:0542
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing updates announced in
advisory RHSA-2011:0542.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* Multiple buffer overflow flaws were found in the Linux kernel's
Management Module Support for Message Passing Technology (MPT) based
controllers. A local, unprivileged user could use these flaws to cause a
denial of service, an information leak, or escalate their privileges.
(CVE-2011-1494, CVE-2011-1495, Important)

* A flaw was found in the Linux kernel's Ethernet bonding driver
implementation. Packets coming in from network devices that have more
than 16 receive queues to a bonding interface could cause a denial of
service. (CVE-2011-1581, Important)

* A flaw was found in the Linux kernel's networking subsystem. If the
number of packets received exceeded the receiver's buffer limit, they were
queued in a backlog, consuming memory, instead of being discarded. A remote
attacker could abuse this flaw to cause a denial of service (out-of-memory
condition). (CVE-2010-4251, Moderate)

* A flaw was found in the Linux kernel's Transparent Huge Pages (THP)
implementation. A local, unprivileged user could abuse this flaw to allow
the user stack (when it is using huge pages) to grow and cause a denial of
service. (CVE-2011-0999, Moderate)

* A flaw was found in the transmit methods (xmit) for the loopback and
InfiniBand transports in the Linux kernel's Reliable Datagram Sockets (RDS)
implementation. A local, unprivileged user could use this flaw to cause a
denial of service. (CVE-2011-1023, Moderate)

* A flaw in the Linux kernel's Event Poll (epoll) implementation could
allow a local, unprivileged user to cause a denial of service.
(CVE-2011-1082, Moderate)

* An inconsistency was found in the interaction between the Linux kernel's
method for allocating NFSv4 (Network File System version 4) ACL data and
the method by which it was freed. This inconsistency led to a kernel panic
which could be triggered by a local, unprivileged user with files owned by
said user on an NFSv4 share. (CVE-2011-1090, Moderate)

* A missing validation check was found in the Linux kernel's
mac_partition() implementation, used for supporting file systems created
on Mac OS operating systems. A local attacker could use this flaw to cause
a denial of service by mounting a disk that contains specially-crafted
partitions. (CVE-2011-1010, Low)

* A buffer overflow flaw in the DEC Alpha OSF partition implementation in
the Linux kernel could allow a local attacker to cause an information leak
by mounting a disk that contains specially-crafted partition tables.
(CVE-2011-1163, Low)

* Missing validations of null-terminated string data structure elements in
the do_replace(), compat_do_replace(), do_ipt_get_ctl(), do_ip6t_get_ctl(),
and do_arpt_get_ctl() functions could allow a local user who has the
CAP_NET_ADMIN capability to cause an information leak. (CVE-2011-1170,
CVE-2011-1171, CVE-2011-1172, Low)

Red Hat would like to thank Dan Rosenberg for reporting CVE-2011-1494 and
CVE-2011-1495
Nelson Elhage for reporting CVE-2011-1082
Timo Warns for
reporting CVE-2011-1010 and CVE-2011-1163
and Vasiliy Kulikov for
reporting CVE-2011-1170, CVE-2011-1171, and CVE-2011-1172.

This update also fixes several hundred bugs and adds enhancements. Refer to
the Red Hat Enterprise Linux 6.1 Release Notes for information on the most
significant of these changes, and the Technical Notes for further
information, both linked to in the References.

All Red Hat Enterprise Linux 6 users are advised to install these updated
packages, which correct these issues, and fix the bugs and add the
enhancements noted in the Red Hat Enterprise Linux 6.1 Release Notes and
Technical Notes. The system must be rebooted for this update to take
effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2011-0542.html
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.1_Release_Notes/index.html
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.1_Technical_Notes/index.html

Risk factor : High

CVSS Score:
7.2

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-4251
BugTraq ID: 46637
http://www.securityfocus.com/bid/46637
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
http://www.securityfocus.com/archive/1/520102/100/0/threaded
http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread
http://secunia.com/advisories/46397
Common Vulnerability Exposure (CVE) ID: CVE-2011-0999
BugTraq ID: 46442
http://www.securityfocus.com/bid/46442
http://openwall.com/lists/oss-security/2011/02/17/3
http://openwall.com/lists/oss-security/2011/02/17/6
XForce ISS Database: kernel-hugepages-dos(65535)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65535
Common Vulnerability Exposure (CVE) ID: CVE-2011-1010
BugTraq ID: 46492
http://www.securityfocus.com/bid/46492
Bugtraq: 20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables (Google Search)
http://www.securityfocus.com/archive/1/516615/100/0/threaded
http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt
http://openwall.com/lists/oss-security/2011/02/22/3
http://openwall.com/lists/oss-security/2011/02/22/11
http://openwall.com/lists/oss-security/2011/02/22/15
http://www.securitytracker.com/id?1025126
http://securityreason.com/securityalert/8115
XForce ISS Database: kernel-map-dos(65643)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65643
Common Vulnerability Exposure (CVE) ID: CVE-2011-1023
http://www.openwall.com/lists/oss-security/2011/03/03/2
Common Vulnerability Exposure (CVE) ID: CVE-2011-1082
https://lkml.org/lkml/2011/2/5/220
http://openwall.com/lists/oss-security/2011/03/02/1
http://openwall.com/lists/oss-security/2011/03/02/2
Common Vulnerability Exposure (CVE) ID: CVE-2011-1090
http://openwall.com/lists/oss-security/2011/03/07/2
http://openwall.com/lists/oss-security/2011/03/07/12
http://securitytracker.com/id?1025336
SuSE Security Announcement: SUSE-SU-2015:0812 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-1163
BugTraq ID: 46878
http://www.securityfocus.com/bid/46878
Bugtraq: 20110317 [PRE-SA-2011-02] Information disclosure vulnerability in the OSF partition handling code of the Linux kernel (Google Search)
http://www.securityfocus.com/archive/1/517050
http://www.pre-cert.de/advisories/PRE-SA-2011-02.txt
http://www.spinics.net/lists/mm-commits/msg82737.html
http://openwall.com/lists/oss-security/2011/03/15/9
http://openwall.com/lists/oss-security/2011/03/15/14
RedHat Security Advisories: RHSA-2011:0833
http://rhn.redhat.com/errata/RHSA-2011-0833.html
http://securitytracker.com/id?1025225
http://securityreason.com/securityalert/8189
Common Vulnerability Exposure (CVE) ID: CVE-2011-1170
http://marc.info/?l=netfilter-devel&m=129978081009955&w=2
http://www.openwall.com/lists/oss-security/2011/03/18/15
http://www.openwall.com/lists/oss-security/2011/03/21/1
http://www.openwall.com/lists/oss-security/2011/03/21/4
http://securityreason.com/securityalert/8278
http://securityreason.com/securityalert/8282
Common Vulnerability Exposure (CVE) ID: CVE-2011-1171
http://marc.info/?l=linux-kernel&m=129978077609894&w=2
http://securityreason.com/securityalert/8283
Common Vulnerability Exposure (CVE) ID: CVE-2011-1172
http://marc.info/?l=linux-kernel&m=129978086410061&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2011-1494
BugTraq ID: 47185
http://www.securityfocus.com/bid/47185
http://lkml.org/lkml/2011/4/5/327
http://openwall.com/lists/oss-security/2011/04/05/32
http://openwall.com/lists/oss-security/2011/04/06/2
Common Vulnerability Exposure (CVE) ID: CVE-2011-1495
Common Vulnerability Exposure (CVE) ID: CVE-2011-1581
http://openwall.com/lists/oss-security/2011/04/13/4
http://openwall.com/lists/oss-security/2011/04/13/16
http://securitytracker.com/id?1025558
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 86218 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2020 E-Soft Inc. Todos los derechos reservados.