|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for dracut RHSA-2013:1674-02|
|Summary:||The remote host is missing an update for the 'dracut'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'dracut'
package(s) announced via the referenced advisory.
The dracut packages include an event-driven initramfs generator
infrastructure based on the udev device manager. The virtual file system,
initramfs, is loaded together with the kernel at boot time and initializes
the system, so it can read and boot from the root partition.
It was discovered that dracut created initramfs images as world readable.
A local user could possibly use this flaw to obtain sensitive information
from these files, such as iSCSI authentication passwords, encrypted root
file system crypttab passwords, or other information. (CVE-2012-4453)
This issue was discovered by Peter Jones of the Red Hat Installer Team.
These updated dracut packages include numerous bug fixes and two
enhancements. Space precludes documenting all of these changes in this
advisory. Users are directed to the Red Hat Enterprise Linux 6.5 Technical
Notes, linked to in the References, for information on the most significant
of these changes.
All dracut users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
dracut on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-4453|
BugTraq ID: 55713
RedHat Security Advisories: RHSA-2013:1674
XForce ISS Database: dracut-initramfs-information-disclosure(79258)
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.