Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.4.2012.0554.1
Categoría:SuSE Local Security Checks
Título:SUSE: Security Advisory (SUSE-SU-2012:0554-1)
Resumen:The remote host is missing an update for the 'Linux kernel' package(s) announced via the SUSE-SU-2012:0554-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'Linux kernel' package(s) announced via the SUSE-SU-2012:0554-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 11 SP2 kernel has been updated to 3.0.26, which fixes a lot of bugs and security issues.

The following security issues have been fixed:

* CVE-2012-1179: A locking problem in transparent hugepage support could be used by local attackers to potentially crash the host, or via kvm a privileged guest user could crash the kvm host system.
* CVE-2011-4127: A potential hypervisor escape by issuing SG_IO commands to partitiondevices was fixed by restricting access to these commands.
* CVE-2012-1146: A local attacker could oops the kernel using memory control groups and eventfds.
* CVE-2011-1083: Limit the path length users can build using epoll() to avoid local attackers consuming lots of kernel CPU time.
* CVE-2012-1097: The regset common infrastructure assumed that regsets would always have .get and .set methods, but necessarily .active methods. Unfortunately people have since written regsets without .set method, so NULL pointer dereference attacks were possible.
* CVE-2011-2494: Access to the /proc/pid/taskstats file requires root access to avoid side channel (timing keypresses etc.) attacks on other users.
* CVE-2011-4086: Fixed a oops in jbd/jbd2 that could be caused by specific filesystem access patterns.
* CVE-2011-4131: A malicious NFSv4 server could have caused a oops in the nfsv4 acl handling.
* CVE-2011-4132: Fixed a oops in jbd/jbd2 that could be caused by mounting a malicious prepared filesystem.

(Also included are all fixes from the 3.0.14 -> 3.0.25 stable kernel updates.)

The following non-security issues have been fixed:

EFI:

* efivars: add missing parameter to efi_pstore_read().

BTRFS:

* add a few error cleanups.
* btrfs: handle errors when excluding super extents
(FATE#306586 bnc#751015).
* btrfs: Fix missing goto in btrfs_ioctl_clone.
* btrfs: Fixed mishandled -EAGAIN error case from btrfs_split_item (bnc#750459).
* btrfs: disallow unequal data/metadata blocksize for mixed block groups (FATE#306586).
* btrfs: enhance superblock sanity checks (FATE#306586 bnc#749651).
* btrfs: update message levels (FATE#306586).
* btrfs 3.3-rc6 updates: o avoid setting ->d_op twice
(FATE#306586 bnc#731387). o btrfs: fix wrong information of the directory in the snapshot (FATE#306586). o btrfs: fix race in reada (FATE#306586). o btrfs: do not add both copies of DUP to reada extent tree (FATE#306586). o btrfs:
stop silently switching single chunks to raid0 on balance
(FATE#306586). o btrfs: fix locking issues in find_parent_nodes() (FATE#306586). o btrfs: fix casting error in scrub reada code (FATE#306586).
* btrfs sync with upstream up to 3.3-rc5 (FATE#306586)
* btrfs: Sector Size check during Mount
* btrfs: avoid positive number with ERR_PTR
* btrfs: return the internal error unchanged if btrfs_get_extent_fiemap() call failed for SEEK_DATA/SEEK_HOLE inquiry.
* btrfs: fix trim 0 bytes after a device delete
* btrfs: do not ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux kernel' package(s) on SLE 11, SUSE Linux Enterprise Desktop 11 SP2, SUSE Linux Enterprise High Availability Extension 11 SP2, SUSE Linux Enterprise Server 11 SP2.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-1083
http://article.gmane.org/gmane.linux.kernel/1105744
http://article.gmane.org/gmane.linux.kernel/1105888
http://article.gmane.org/gmane.linux.kernel/1106686
http://openwall.com/lists/oss-security/2011/03/02/1
http://openwall.com/lists/oss-security/2011/03/02/2
http://www.osvdb.org/71265
RedHat Security Advisories: RHSA-2012:0862
http://rhn.redhat.com/errata/RHSA-2012-0862.html
http://secunia.com/advisories/43522
http://secunia.com/advisories/48115
http://secunia.com/advisories/48410
http://secunia.com/advisories/48898
http://secunia.com/advisories/48964
SuSE Security Announcement: SUSE-SU-2012:0554 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
SuSE Security Announcement: SUSE-SU-2012:0616 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-2494
http://www.openwall.com/lists/oss-security/2011/06/27/1
Common Vulnerability Exposure (CVE) ID: CVE-2011-4086
Debian Security Information: DSA-2469 (Google Search)
http://www.debian.org/security/2012/dsa-2469
RedHat Security Advisories: RHSA-2012:0571
http://rhn.redhat.com/errata/RHSA-2012-0571.html
RedHat Security Advisories: RHSA-2012:0670
http://rhn.redhat.com/errata/RHSA-2012-0670.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-4127
http://www.openwall.com/lists/oss-security/2011/12/22/5
SuSE Security Announcement: SUSE-SU-2015:0812 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-4131
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081280.html
http://www.openwall.com/lists/oss-security/2011/11/12/1
RedHat Security Advisories: RHSA-2012:1541
http://rhn.redhat.com/errata/RHSA-2012-1541.html
SuSE Security Announcement: openSUSE-SU-2013:0925 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2011-4132
BugTraq ID: 50663
http://www.securityfocus.com/bid/50663
http://xorl.wordpress.com/2011/12/08/cve-2011-4132-linux-kernel-jbdjbd2-local-dos/
http://www.openwall.com/lists/oss-security/2011/11/11/6
http://www.openwall.com/lists/oss-security/2011/11/13/4
http://securitytracker.com/id?1026325
Common Vulnerability Exposure (CVE) ID: CVE-2012-1090
http://www.openwall.com/lists/oss-security/2012/02/28/4
RedHat Security Advisories: RHSA-2012:0481
http://rhn.redhat.com/errata/RHSA-2012-0481.html
RedHat Security Advisories: RHSA-2012:0531
http://rhn.redhat.com/errata/RHSA-2012-0531.html
http://secunia.com/advisories/48842
Common Vulnerability Exposure (CVE) ID: CVE-2012-1097
http://www.openwall.com/lists/oss-security/2012/03/05/1
Common Vulnerability Exposure (CVE) ID: CVE-2012-1146
http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075781.html
http://www.openwall.com/lists/oss-security/2012/03/07/3
XForce ISS Database: kernel-memcg-dos(73711)
https://exchange.xforce.ibmcloud.com/vulnerabilities/73711
Common Vulnerability Exposure (CVE) ID: CVE-2012-1179
HPdes Security Advisory: HPSBGN02970
http://marc.info/?l=bugtraq&m=139447903326211&w=2
http://www.openwall.com/lists/oss-security/2012/03/15/7
RedHat Security Advisories: RHSA-2012:0743
http://rhn.redhat.com/errata/RHSA-2012-0743.html
http://www.securitytracker.com/id?1027084
http://secunia.com/advisories/48404
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2021 E-Soft Inc. Todos los derechos reservados.