Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2011:0500
The remote host is missing updates announced in
advisory RHSA-2011:0500.

The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A race condition in the way the Linux kernel's InfiniBand implementation
set up new connections could allow a remote user to cause a denial of
service. (CVE-2011-0695, Important)

* An integer signedness flaw in drm_modeset_ctl() could allow a local,
unprivileged user to cause a denial of service or escalate their
privileges. (CVE-2011-1013, Important)

* A flaw in dccp_rcv_state_process() could allow a remote attacker to cause
a denial of service, even when the socket was already closed.
(CVE-2011-1093, Important)

* A missing validation of a null-terminated string data structure element
in bnep_sock_ioctl() could allow a local user to cause an information leak
or a denial of service. (CVE-2011-1079, Moderate)

* A flaw in the Linux kernel's Event Poll (epoll) implementation could
allow a local, unprivileged user to cause a denial of service.
(CVE-2011-1082, Moderate)

* A missing initialization flaw in the XFS file system implementation could
lead to an information leak. (CVE-2011-0711, Low)

* The start_code and end_code values in /proc/[pid]/stat were not
protected. In certain scenarios, this flaw could be used to defeat Address
Space Layout Randomization (ASLR). (CVE-2011-0726, Low)

* A missing validation check in the Linux kernel's mac_partition()
implementation, used for supporting file systems created on Mac OS
operating systems, could allow a local attacker to cause a denial of
service by mounting a disk that contains specially-crafted partitions.
(CVE-2011-1010, Low)

* A flaw in dev_load() could allow a local user who has the CAP_NET_ADMIN
capability to load arbitrary modules from /lib/modules/, instead of only
netdev modules. (CVE-2011-1019, Low)

* A missing initialization flaw in sco_sock_getsockopt_old() could allow a
local, unprivileged user to cause an information leak. (CVE-2011-1078, Low)

* A buffer overflow flaw in the DEC Alpha OSF partition implementation in
the Linux kernel could allow a local attacker to cause an information leak
by mounting a disk that contains specially-crafted partition tables.
(CVE-2011-1163, Low)

* Missing validations of null-terminated string data structure elements
in the do_replace(), compat_do_replace(), do_ipt_get_ctl(),
do_ip6t_get_ctl(), and do_arpt_get_ctl() functions could allow a local user
who has the CAP_NET_ADMIN capability to cause an information leak.
(CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1080, Low)

Red Hat would like to thank Jens Kuehnel for reporting CVE-2011-0695

Vasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1019, CVE-2011-1078,
CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, and CVE-2011-1080
Elhage for reporting CVE-2011-1082
Dan Rosenberg for reporting
Kees Cook for reporting CVE-2011-0726
and Timo Warns for
reporting CVE-2011-1010 and CVE-2011-1163.

This update also fixes various bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Users should upgrade to these updated packages, which upgrade the kernel-rt
kernel to version, and correct these issues. The system must
be rebooted for this update to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : High

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-0695
BugTraq ID: 46839
RedHat Security Advisories: RHSA-2011:0927
XForce ISS Database: kernel-infiniband-dos(66056)
Common Vulnerability Exposure (CVE) ID: CVE-2011-0711
BugTraq ID: 46417
Common Vulnerability Exposure (CVE) ID: CVE-2011-0726
BugTraq ID: 47791
RedHat Security Advisories: RHSA-2011:0833
Common Vulnerability Exposure (CVE) ID: CVE-2011-1010
BugTraq ID: 46492
Bugtraq: 20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables (Google Search)
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
XForce ISS Database: kernel-map-dos(65643)
Common Vulnerability Exposure (CVE) ID: CVE-2011-1013
BugTraq ID: 47639
XForce ISS Database: kernel-drmioctl-priv-escalation(67199)
Common Vulnerability Exposure (CVE) ID: CVE-2011-1019
Common Vulnerability Exposure (CVE) ID: CVE-2011-1078
RedHat Security Advisories: RHSA-2012:1156
Common Vulnerability Exposure (CVE) ID: CVE-2011-1079
Common Vulnerability Exposure (CVE) ID: CVE-2011-1080
Common Vulnerability Exposure (CVE) ID: CVE-2011-1082
Common Vulnerability Exposure (CVE) ID: CVE-2011-1093
BugTraq ID: 46793
Common Vulnerability Exposure (CVE) ID: CVE-2011-1163
BugTraq ID: 46878
Bugtraq: 20110317 [PRE-SA-2011-02] Information disclosure vulnerability in the OSF partition handling code of the Linux kernel (Google Search)
SuSE Security Announcement: SUSE-SU-2015:0812 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2011-1170
Common Vulnerability Exposure (CVE) ID: CVE-2011-1171
Common Vulnerability Exposure (CVE) ID: CVE-2011-1172
CopyrightCopyright (c) 2011 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.