Anfälligkeitssuche        Suche in 172616 CVE Beschreibungen
und 81291 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.71935
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2012:0116
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing updates announced in
advisory RHSA-2012:0116.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* The proc file system could allow a local, unprivileged user to obtain
sensitive information or possibly cause integrity issues. (CVE-2011-1020,
Moderate)

* Non-member VLAN (virtual LAN) packet handling for interfaces in
promiscuous mode and also using the be2net driver could allow an attacker
on the local network to cause a denial of service. (CVE-2011-3347,
Moderate)

* A missing validation flaw was found in the Linux kernel's m_stop()
implementation. A local, unprivileged user could use this flaw to trigger
a denial of service. (CVE-2011-3637, Moderate)

* A flaw was found in the Linux kernel in the way splitting two extents in
ext4_ext_convert_to_initialized() worked. A local, unprivileged user with
the ability to mount and unmount ext4 file systems could use this flaw to
cause a denial of service. (CVE-2011-3638, Moderate)

* A NULL pointer dereference flaw was found in the way the Linux kernel's
key management facility handled user-defined key types. A local,
unprivileged user could use the keyctl utility to cause a denial of
service. (CVE-2011-4110, Moderate)

Red Hat would like to thank Kees Cook for reporting CVE-2011-1020
Somnath
Kotur for reporting CVE-2011-3347
and Zheng Liu for reporting
CVE-2011-3638.

This update also fixes several bugs. Documentation for these changes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs noted in the Technical
Notes. The system must be rebooted for this update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2012-0116.html

Risk factor : Medium

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-1020
BugTraq ID: 46567
http://www.securityfocus.com/bid/46567
http://seclists.org/fulldisclosure/2011/Jan/421
http://www.halfdog.net/Security/2011/SuidBinariesAndProcInterface/
https://lkml.org/lkml/2011/2/7/414
https://lkml.org/lkml/2011/2/7/474
https://lkml.org/lkml/2011/2/7/368
https://lkml.org/lkml/2011/2/7/404
https://lkml.org/lkml/2011/2/7/466
https://lkml.org/lkml/2011/2/10/21
https://lkml.org/lkml/2011/2/9/417
http://openwall.com/lists/oss-security/2011/02/24/18
http://openwall.com/lists/oss-security/2011/02/25/2
http://secunia.com/advisories/43496
http://securityreason.com/securityalert/8107
XForce ISS Database: kernel-procpid-security-bypass(65693)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65693
Common Vulnerability Exposure (CVE) ID: CVE-2011-3347
Common Vulnerability Exposure (CVE) ID: CVE-2011-3637
http://www.openwall.com/lists/oss-security/2012/02/06/1
Common Vulnerability Exposure (CVE) ID: CVE-2011-3638
http://www.openwall.com/lists/oss-security/2011/10/24/2
Common Vulnerability Exposure (CVE) ID: CVE-2011-4110
BugTraq ID: 50755
http://www.securityfocus.com/bid/50755
HPdes Security Advisory: HPSBGN02970
http://marc.info/?l=bugtraq&m=139447903326211&w=2
https://lkml.org/lkml/2011/11/15/363
http://www.openwall.com/lists/oss-security/2011/11/21/19
http://www.openwall.com/lists/oss-security/2011/11/22/6
http://www.openwall.com/lists/oss-security/2011/11/22/5
http://secunia.com/advisories/47754
http://www.ubuntu.com/usn/USN-1324-1
http://www.ubuntu.com/usn/USN-1328-1
http://www.ubuntu.com/usn/USN-1344-1
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 81291 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.