Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.841148
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-1579-1)
Summary:The remote host is missing an update for the 'linux' package(s) announced via the USN-1579-1 advisory.
Description:Summary:
The remote host is missing an update for the 'linux' package(s) announced via the USN-1579-1 advisory.

Vulnerability Insight:
Ben Hutchings reported a flaw in the Linux kernel with some network drivers
that support TSO (TCP segment offload). A local or peer user could exploit
this flaw to cause a denial of service. (CVE-2012-3412)

Jay Fenlason and Doug Ledford discovered a bug in the Linux kernel
implementation of RDS sockets. A local unprivileged user could potentially
use this flaw to read privileged information from the kernel.
(CVE-2012-3430)

Mathias Krause discovered an information leak in the Linux kernel's TUN/TAP
device driver. A local user could exploit this flaw to examine part of the
kernel's stack memory. (CVE-2012-6547)

A flaw was discovered in the requeuing of futexes in the Linux kernel. A
local user could exploit this flaw to cause a denial of service (system
crash) or possibly have other unspecified impact. (CVE-2012-6647)

A flaw was found in Linux kernel's validation of CIPSO (Common IP Security
Option) options set from userspace. A local user that can set a socket's
CIPSO options could exploit this flaw to cause a denial of service (crash
the system). (CVE-2013-0310)

Affected Software/OS:
'linux' package(s) on Ubuntu 12.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-3412
50633
http://secunia.com/advisories/50633
50732
http://secunia.com/advisories/50732
50811
http://secunia.com/advisories/50811
51193
http://secunia.com/advisories/51193
RHSA-2012:1323
http://rhn.redhat.com/errata/RHSA-2012-1323.html
RHSA-2012:1324
http://rhn.redhat.com/errata/RHSA-2012-1324.html
RHSA-2012:1347
http://rhn.redhat.com/errata/RHSA-2012-1347.html
RHSA-2012:1375
http://rhn.redhat.com/errata/RHSA-2012-1375.html
RHSA-2012:1401
http://rhn.redhat.com/errata/RHSA-2012-1401.html
RHSA-2012:1430
http://rhn.redhat.com/errata/RHSA-2012-1430.html
SUSE-SU-2012:1679
https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
USN-1567-1
http://www.ubuntu.com/usn/USN-1567-1
USN-1568-1
http://www.ubuntu.com/usn/USN-1568-1
USN-1572-1
http://www.ubuntu.com/usn/USN-1572-1
USN-1575-1
http://www.ubuntu.com/usn/USN-1575-1
USN-1577-1
http://www.ubuntu.com/usn/USN-1577-1
USN-1578-1
http://www.ubuntu.com/usn/USN-1578-1
USN-1579-1
http://www.ubuntu.com/usn/USN-1579-1
USN-1580-1
http://www.ubuntu.com/usn/USN-1580-1
[oss-security] 20120803 Remote DoS in Linux sfc driver through TCP MSS option (CVE-2012-3412)
http://www.openwall.com/lists/oss-security/2012/08/03/4
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30
https://bugzilla.redhat.com/show_bug.cgi?id=844714
https://github.com/torvalds/linux/commit/68cb695ccecf949d48949e72f8ce591fdaaa325c
openSUSE-SU-2012:1330
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-3430
[oss-security] 20120726 Re: CVE Request -- kernel: recv{from,msg}() on an rds socket can leak kernel memory
http://www.openwall.com/lists/oss-security/2012/07/26/5
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44
https://bugzilla.redhat.com/show_bug.cgi?id=820039
https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7
Common Vulnerability Exposure (CVE) ID: CVE-2012-6547
http://www.mandriva.com/security/advisories?name=MDVSA-2013:176
http://www.openwall.com/lists/oss-security/2013/03/05/13
RedHat Security Advisories: RHSA-2013:0744
http://rhn.redhat.com/errata/RHSA-2013-0744.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-6647
[oss-security] 20140514 Re: CVE request Linux kernel: forbid uaddr == uaddr2 in futex_wait_requeue_pi() to avoid null dereference
http://www.openwall.com/lists/oss-security/2014/05/14/9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f7b0a2a5c0fb03be7c25bd1745baa50582348ef
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.5.1
https://bugzilla.redhat.com/show_bug.cgi?id=1097746
https://github.com/torvalds/linux/commit/6f7b0a2a5c0fb03be7c25bd1745baa50582348ef
Common Vulnerability Exposure (CVE) ID: CVE-2013-0310
RHSA-2013:0496
http://rhn.redhat.com/errata/RHSA-2013-0496.html
[oss-security] 20130219 Re: CVE request -- Linux kernel: net: CIPSO_V4_TAG_LOCAL tag NULL pointer dereference
http://www.openwall.com/lists/oss-security/2013/02/20/5
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89d7ae34cdda4195809a5a987f697a517a2a3177
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.8
https://bugzilla.redhat.com/show_bug.cgi?id=912900
https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.