![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.881073 |
Category: | CentOS Local Security Checks |
Title: | CentOS Update for kernel CESA-2012:1064 centos6 |
Summary: | The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'kernel' package(s) announced via the referenced advisory. Vulnerability Insight: The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * A NULL pointer dereference flaw was found in the nf_ct_frag6_reasm() function in the Linux kernel's netfilter IPv6 connection tracking implementation. A remote attacker could use this flaw to send specially-crafted packets to a target system that is using IPv6 and also has the nf_conntrack_ipv6 kernel module loaded, causing it to crash. (CVE-2012-2744, Important) * A flaw was found in the way the Linux kernel's key management facility handled replacement session keyrings on process forks. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2012-2745, Moderate) Red Hat would like to thank an anonymous contributor working with the Beyond Security SecuriTeam Secure Disclosure program for reporting CVE-2012-2744. This update also fixes the following bugs: * Previously introduced firmware files required for new Realtek chipsets contained an invalid prefix ('rtl_nic_') in the file names, for example '/lib/firmware/rtl_nic/rtl_nic_rtl8168d-1.fw'. This update corrects these file names. For example, the aforementioned file is now correctly named '/lib/firmware/rtl_nic/rtl8168d-1.fw'. (BZ#832359) * This update blacklists the ADMA428M revision of the 2GB ATA Flash Disk device. This is due to data corruption occurring on the said device when the Ultra-DMA 66 transfer mode is used. When the 'libata.force=5:pio0, 6:pio0' kernel parameter is set, the aforementioned device works as expected. (BZ#832363) * On Red Hat Enterprise Linux 6, mounting an NFS export from a server running Windows Server 2012 Release Candidate returned the NFS4ERR_MINOR_VERS_MISMATCH error because Windows Server 2012 Release Candidate supports NFSv4.1 only. Red Hat Enterprise Linux 6 did not properly handle the returned error and did not fall back to using NFSv3, which caused the mount operation to fail. With this update, when the NFS4ERR_MINOR_VERS_MISMATCH error is returned, the mount operation properly falls back to using NFSv3 and no longer fails. (BZ#832365) * On ext4 file systems, when fallocate() failed to allocate blocks due to the ENOSPC condition (no space left on device) for a file larger than 4 GB, the size of the file became corrupted and, consequently, caused file system corruption. This was due to a missing cast operator in the 'ext4_fallocate()' function. With this update, the underlying source code has b ... Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: kernel on CentOS 6 Solution: Please install the updated packages. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-2744 1027235 http://www.securitytracker.com/id?1027235 49928 http://secunia.com/advisories/49928 54367 http://www.securityfocus.com/bid/54367 RHSA-2012:1064 http://rhn.redhat.com/errata/RHSA-2012-1064.html RHSA-2012:1148 http://rhn.redhat.com/errata/RHSA-2012-1148.html http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9e2dcf72023d1447f09c47d77c99b0c49659e5ce https://bugzilla.redhat.com/show_bug.cgi?id=833402 https://github.com/torvalds/linux/commit/9e2dcf72023d1447f09c47d77c99b0c49659e5ce Common Vulnerability Exposure (CVE) ID: CVE-2012-2745 1027236 http://www.securitytracker.com/id?1027236 50633 http://secunia.com/advisories/50633 50853 http://secunia.com/advisories/50853 50961 http://secunia.com/advisories/50961 54365 http://www.securityfocus.com/bid/54365 USN-1567-1 http://www.ubuntu.com/usn/USN-1567-1 USN-1597-1 http://www.ubuntu.com/usn/USN-1597-1 USN-1606-1 http://www.ubuntu.com/usn/USN-1606-1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=79549c6dfda0603dba9a70a53467ce62d9335c33 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.2 https://bugzilla.redhat.com/show_bug.cgi?id=833428 https://github.com/torvalds/linux/commit/79549c6dfda0603dba9a70a53467ce62d9335c33 |
Copyright | Copyright (C) 2012 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |