Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.881125
Category:CentOS Local Security Checks
Title:CentOS Update for kernel CESA-2012:0743 centos6
Summary:The remote host is missing an update for the 'kernel'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'kernel'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

* A local, unprivileged user could use an integer overflow flaw in
drm_mode_dirtyfb_ioctl() to cause a denial of service or escalate their
privileges. (CVE-2012-0044, Important)

* A buffer overflow flaw was found in the macvtap device driver, used for
creating a bridged network between the guest and the host in KVM
(Kernel-based Virtual Machine) environments. A privileged guest user in a
KVM guest could use this flaw to crash the host. Note: This issue only
affected hosts that have the vhost_net module loaded with the
experimental_zcopytx module option enabled (it is not enabled by default),
and that also have macvtap configured for at least one guest.
(CVE-2012-2119, Important)

* When a set user ID (setuid) application is executed, certain personality
flags for controlling the application's behavior are cleared (that is, a
privileged application will not be affected by those flags). It was found
that those flags were not cleared if the application was made privileged
via file system capabilities. A local, unprivileged user could use this
flaw to change the behavior of such applications, allowing them to bypass
intended restrictions. Note that for default installations, no application
shipped by Red Hat for Red Hat Enterprise Linux is made privileged via file
system capabilities. (CVE-2012-2123, Important)

* It was found that the data_len parameter of the sock_alloc_send_pskb()
function in the Linux kernel's networking implementation was not validated
before use. A privileged guest user in a KVM guest could use this flaw to
crash the host or, possibly, escalate their privileges on the host.
(CVE-2012-2136, Important)

* A buffer overflow flaw was found in the setup_routing_entry() function in
the KVM subsystem of the Linux kernel in the way the Message Signaled
Interrupts (MSI) routing entry was handled. A local, unprivileged user
could use this flaw to cause a denial of service or, possibly, escalate
their privileges. (CVE-2012-2137, Important)

* A race condition was found in the Linux kernel's memory management
subsystem in the way pmd_none_or_clear_bad(), when called with mmap_sem in
read mode, and Transparent Huge Pages (THP) page faults interacted. A
privileged user in a KVM guest with the ballooning functionality enabled
could potentially use this flaw to crash the host. A local, unprivileged
user could use this flaw to crash the system. (CVE-2012-1179, Moderate) ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
kernel on CentOS 6

Solution:
Please install the updated packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-0044
51371
http://www.securityfocus.com/bid/51371
RHSA-2012:0743
http://rhn.redhat.com/errata/RHSA-2012-0743.html
USN-1555-1
http://www.ubuntu.com/usn/USN-1555-1
USN-1556-1
http://www.ubuntu.com/usn/USN-1556-1
[oss-security] 20120111 Re: CVE request - kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()
http://www.openwall.com/lists/oss-security/2012/01/12/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a5cd335165e31db9dbab636fd29895d41da55dd2
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.5
https://bugzilla.redhat.com/show_bug.cgi?id=772894
https://github.com/torvalds/linux/commit/a5cd335165e31db9dbab636fd29895d41da55dd2
Common Vulnerability Exposure (CVE) ID: CVE-2012-1179
1027084
http://www.securitytracker.com/id?1027084
48404
http://secunia.com/advisories/48404
48898
http://secunia.com/advisories/48898
FEDORA-2012-3712
http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075781.html
HPSBGN02970
http://marc.info/?l=bugtraq&m=139447903326211&w=2
SUSE-SU-2012:0554
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
[oss-security] 20120315 CVE-2012-1179 kernel: thp: __split_huge_page() mapcount != page_mapcount BUG_ON()
http://www.openwall.com/lists/oss-security/2012/03/15/7
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.1
https://bugzilla.redhat.com/show_bug.cgi?id=803793
https://github.com/torvalds/linux/commit/4a1d704194a441bf83c636004a479e01360ec850
Common Vulnerability Exposure (CVE) ID: CVE-2012-2119
USN-1529-1
http://ubuntu.com/usn/usn-1529-1
[linux-netdev] 20120416 [PATCH 3/6] macvtap: zerocopy: validate vector length before pinning user pages
http://marc.info/?l=linux-netdev&m=133455718001608&w=2
[oss-security] 20120419 Re: CVE request -- kernel: macvtap: zerocopy: vector length is not validated before pinning user pages
http://www.openwall.com/lists/oss-security/2012/04/19/14
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=814278
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b92946e2919134ebe2a4083e4302236295ea2a73
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5
https://github.com/torvalds/linux/commit/b92946e2919134ebe2a4083e4302236295ea2a73
https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=4aae94d1c7b32316911c86176c0ed4f8ed62da73
openSUSE-SU-2013:0925
http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-2121
1027083
http://www.securitytracker.com/id?1027083
50732
http://secunia.com/advisories/50732
RHSA-2012:0676
http://rhn.redhat.com/errata/RHSA-2012-0676.html
USN-1577-1
http://www.ubuntu.com/usn/USN-1577-1
USN-2036-1
http://www.ubuntu.com/usn/USN-2036-1
USN-2037-1
http://www.ubuntu.com/usn/USN-2037-1
[oss-security] 20120419 Re: CVE request -- kernel: kvm: device assignment page leak
http://www.openwall.com/lists/oss-security/2012/04/19/16
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.4
https://bugzilla.redhat.com/show_bug.cgi?id=814149
https://github.com/torvalds/linux/commit/09ca8e1173bcb12e2a449698c9ae3b86a8a10195
Common Vulnerability Exposure (CVE) ID: CVE-2012-2123
1027072
http://www.securitytracker.com/id?1027072
53166
http://www.securityfocus.com/bid/53166
DSA-2469
http://www.debian.org/security/2012/dsa-2469
RHSA-2012:0670
http://rhn.redhat.com/errata/RHSA-2012-0670.html
[oss-security] 20120419 Re: CVE request: kernel: fcaps: clear the same personality flags as suid when fcaps are used
http://www.openwall.com/lists/oss-security/2012/04/20/6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d52fc5dde171f030170a6cb78034d166b13c9445
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.3
https://bugzilla.redhat.com/show_bug.cgi?id=806722
https://github.com/torvalds/linux/commit/d52fc5dde171f030170a6cb78034d166b13c9445
linux-kernel-fcaps-sec-bypass(75043)
https://exchange.xforce.ibmcloud.com/vulnerabilities/75043
Common Vulnerability Exposure (CVE) ID: CVE-2012-2136
50807
http://secunia.com/advisories/50807
53721
http://www.securityfocus.com/bid/53721
RHSA-2012:1087
http://rhn.redhat.com/errata/RHSA-2012-1087.html
USN-1535-1
http://www.ubuntu.com/usn/USN-1535-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc
https://bugzilla.redhat.com/show_bug.cgi?id=816289
https://github.com/torvalds/linux/commit/cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc
Common Vulnerability Exposure (CVE) ID: CVE-2012-2137
50952
http://secunia.com/advisories/50952
50961
http://secunia.com/advisories/50961
54063
http://www.securityfocus.com/bid/54063
USN-1594-1
http://www.ubuntu.com/usn/USN-1594-1
USN-1606-1
http://www.ubuntu.com/usn/USN-1606-1
USN-1607-1
http://ubuntu.com/usn/usn-1607-1
USN-1609-1
http://www.ubuntu.com/usn/USN-1609-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed
http://ubuntu.5.n6.nabble.com/PATCH-Oneiric-CVE-2012-2137-KVM-Fix-buffer-overflow-in-kvm-set-irq-td4990566.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.24
https://bugzilla.redhat.com/show_bug.cgi?id=816151
Common Vulnerability Exposure (CVE) ID: CVE-2012-2372
54062
http://www.securityfocus.com/bid/54062
RHSA-2012:1540
http://rhn.redhat.com/errata/RHSA-2012-1540.html
SUSE-SU-2012:1679
https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
https://bugzilla.redhat.com/show_bug.cgi?id=822754
https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=c7b6a0a1d8d636852be130fa15fa8be10d4704e8
Common Vulnerability Exposure (CVE) ID: CVE-2012-2373
[oss-security] 20120518 Re: CVE Request -- kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race condition
http://www.openwall.com/lists/oss-security/2012/05/18/11
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=26c191788f18129af0eb32a358cdaea0c7479626
https://bugzilla.redhat.com/show_bug.cgi?id=822821
https://github.com/torvalds/linux/commit/26c191788f18129af0eb32a358cdaea0c7479626
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.