Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.71939
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2011:1106
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2011:1106.

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

* A flaw allowed napi_reuse_skb() to be called on VLAN (virtual LAN)
packets. An attacker on the local network could trigger this flaw by
sending specially-crafted packets to a target system, possibly causing a
denial of service. (CVE-2011-1576, Moderate)

Red Hat would like to thank Ryan Sweat for reporting this issue.

This update also fixes the following bugs:

* The LSI SAS2 controller firmware issued an 0x620f fault while performing
I/O operations and with a Task Manager running, causing possible data
corruption. This update corrects this issue. (BZ#710625)

* The crashkernel memory region can overlap the RunTime Abstraction
Services (RTAS) memory region. If the crashkernel memory region was freed,
the RTAS memory region was freed as well and the system would crash. With
this update, the crash_free_reserved_phys_range() function is overridden
and overlaps with the RTAS memory region are checked so that system crashes
no longer occur. (BZ#710626)

* If the microcode module was loaded, saving and restoring a Xen guest
returned a warning message and a backtrace error. With this update,
backtrace errors are no longer returned, and saving and restoring a Xen
guest works as expected. (BZ#710632)

* When the Distributed Lock Manager (DLM) queued three callbacks for a lock
in the following sequence: blocking - completion - blocking, it would
consider the final blocking callback redundant and skip it. Because the
callback was skipped, GFS would not release the lock, causing processes on
other nodes to wait indefinitely for it. With this update, the DLM does not
skip the necessary blocking callback. (BZ#710642)

* The XFRM_SUB_POLICY feature causes all bundles to be at the finest
granularity possible. As a result of the data structure used to implement
this, the system performance would drop considerably. This update disables
a part of XFRM_SUB_POLICY, eliminating the poor performance at the cost of
sub-IP address selection granularity in the policy. (BZ#710645)

* A kernel panic in the mpt2sas driver could occur on an IBM system using a
drive with SMART (Self-Monitoring, Analysis and Reporting Technology)
issues. This was because the driver was sending an SEP request while the
kernel was in the interrupt context, causing the driver to enter the sleep
state. With this update, a fake event is now executed from the interrupt
context, assuring the SEP request is properly issued. (BZ#714189)

Finally, this update provides the following enhancements:

* This update introduces a kernel module option that allows the Flow
Director to be disabled. (BZ#711549)

* This update introduces parallel port printer support for Red Hat
Enterprise Linux 6. (BZ#713825)

* This update restricts access to the /proc/kcore file to ELF headers only.
(BZ#710638)

Users should upgrade to these updated packages, which contain backported
patches to resolve these issues and add these enhancements. The system must
be rebooted for this update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2011-1106.html

Risk factor : Medium

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1576
BugTraq ID: 48907
http://www.securityfocus.com/bid/48907
RedHat Security Advisories: RHSA-2011:0927
http://rhn.redhat.com/errata/RHSA-2011-0927.html
http://www.redhat.com/support/errata/RHSA-2011-1090.html
http://www.redhat.com/support/errata/RHSA-2011-1106.html
http://www.securitytracker.com/id?1025853
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.