Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.870685
Category:Red Hat Local Security Checks
Title:RedHat Update for Red Hat Enterprise Linux 6.1 kernel RHSA-2011:0542-01
Summary:The remote host is missing an update for the 'Red Hat Enterprise Linux 6.1 kernel'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'Red Hat Enterprise Linux 6.1 kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* Multiple buffer overflow flaws were found in the Linux kernel's
Management Module Support for Message Passing Technology (MPT) based
controllers. A local, unprivileged user could use these flaws to cause a
denial of service, an information leak, or escalate their privileges.
(CVE-2011-1494, CVE-2011-1495, Important)

* A flaw was found in the Linux kernel's Ethernet bonding driver
implementation. Packets coming in from network devices that have more
than 16 receive queues to a bonding interface could cause a denial of
service. (CVE-2011-1581, Important)

* A flaw was found in the Linux kernel's networking subsystem. If the
number of packets received exceeded the receiver's buffer limit, they were
queued in a backlog, consuming memory, instead of being discarded. A remote
attacker could abuse this flaw to cause a denial of service (out-of-memory
condition). (CVE-2010-4251, Moderate)

* A flaw was found in the Linux kernel's Transparent Huge Pages (THP)
implementation. A local, unprivileged user could abuse this flaw to allow
the user stack (when it is using huge pages) to grow and cause a denial of
service. (CVE-2011-0999, Moderate)

* A flaw was found in the transmit methods (xmit) for the loopback and
InfiniBand transports in the Linux kernel's Reliable Datagram Sockets (RDS)
implementation. A local, unprivileged user could use this flaw to cause a
denial of service. (CVE-2011-1023, Moderate)

* A flaw in the Linux kernel's Event Poll (epoll) implementation could
allow a local, unprivileged user to cause a denial of service.
(CVE-2011-1082, Moderate)

* An inconsistency was found in the interaction between the Linux kernel's
method for allocating NFSv4 (Network File System version 4) ACL data and
the method by which it was freed. This inconsistency led to a kernel panic
which could be triggered by a local, unprivileged user with files owned by
said user on an NFSv4 share. (CVE-2011-1090, Moderate)

* A missing validation check was found in the Linux kernel's
mac_partition() implementation, used for supporting file systems created
on Mac OS operating systems. A local attacker could use this flaw to cause
a denial of service by mounting a disk that contains specially-crafted
partitions. (CVE-2011-1010, Low)

* A buffer ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
Red Hat Enterprise Linux 6.1 kernel on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-4251
BugTraq ID: 46637
http://www.securityfocus.com/bid/46637
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
http://www.securityfocus.com/archive/1/520102/100/0/threaded
http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread
http://secunia.com/advisories/46397
Common Vulnerability Exposure (CVE) ID: CVE-2011-0999
BugTraq ID: 46442
http://www.securityfocus.com/bid/46442
http://openwall.com/lists/oss-security/2011/02/17/3
http://openwall.com/lists/oss-security/2011/02/17/6
XForce ISS Database: kernel-hugepages-dos(65535)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65535
Common Vulnerability Exposure (CVE) ID: CVE-2011-1010
BugTraq ID: 46492
http://www.securityfocus.com/bid/46492
Bugtraq: 20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables (Google Search)
http://www.securityfocus.com/archive/1/516615/100/0/threaded
http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt
http://openwall.com/lists/oss-security/2011/02/22/3
http://openwall.com/lists/oss-security/2011/02/22/11
http://openwall.com/lists/oss-security/2011/02/22/15
http://www.securitytracker.com/id?1025126
http://securityreason.com/securityalert/8115
XForce ISS Database: kernel-map-dos(65643)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65643
Common Vulnerability Exposure (CVE) ID: CVE-2011-1023
http://www.openwall.com/lists/oss-security/2011/03/03/2
Common Vulnerability Exposure (CVE) ID: CVE-2011-1082
https://lkml.org/lkml/2011/2/5/220
http://openwall.com/lists/oss-security/2011/03/02/1
http://openwall.com/lists/oss-security/2011/03/02/2
Common Vulnerability Exposure (CVE) ID: CVE-2011-1090
http://openwall.com/lists/oss-security/2011/03/07/2
http://openwall.com/lists/oss-security/2011/03/07/12
http://securitytracker.com/id?1025336
SuSE Security Announcement: SUSE-SU-2015:0812 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-1163
BugTraq ID: 46878
http://www.securityfocus.com/bid/46878
Bugtraq: 20110317 [PRE-SA-2011-02] Information disclosure vulnerability in the OSF partition handling code of the Linux kernel (Google Search)
http://www.securityfocus.com/archive/1/517050
http://www.pre-cert.de/advisories/PRE-SA-2011-02.txt
http://www.spinics.net/lists/mm-commits/msg82737.html
http://openwall.com/lists/oss-security/2011/03/15/9
http://openwall.com/lists/oss-security/2011/03/15/14
RedHat Security Advisories: RHSA-2011:0833
http://rhn.redhat.com/errata/RHSA-2011-0833.html
http://securitytracker.com/id?1025225
http://securityreason.com/securityalert/8189
Common Vulnerability Exposure (CVE) ID: CVE-2011-1170
http://marc.info/?l=netfilter-devel&m=129978081009955&w=2
http://www.openwall.com/lists/oss-security/2011/03/18/15
http://www.openwall.com/lists/oss-security/2011/03/21/1
http://www.openwall.com/lists/oss-security/2011/03/21/4
http://securityreason.com/securityalert/8278
http://securityreason.com/securityalert/8282
Common Vulnerability Exposure (CVE) ID: CVE-2011-1171
http://marc.info/?l=linux-kernel&m=129978077609894&w=2
http://securityreason.com/securityalert/8283
Common Vulnerability Exposure (CVE) ID: CVE-2011-1172
http://marc.info/?l=linux-kernel&m=129978086410061&w=2
Common Vulnerability Exposure (CVE) ID: CVE-2011-1494
BugTraq ID: 47185
http://www.securityfocus.com/bid/47185
http://lkml.org/lkml/2011/4/5/327
http://openwall.com/lists/oss-security/2011/04/05/32
http://openwall.com/lists/oss-security/2011/04/06/2
Common Vulnerability Exposure (CVE) ID: CVE-2011-1495
Common Vulnerability Exposure (CVE) ID: CVE-2011-1581
http://openwall.com/lists/oss-security/2011/04/13/4
http://openwall.com/lists/oss-security/2011/04/13/16
http://securitytracker.com/id?1025558
CopyrightCopyright (C) 2012 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.