Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69222
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2011:0330
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2011:0330.

The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

* Missing boundary checks in the PPP over L2TP sockets implementation could
allow a local, unprivileged user to cause a denial of service or escalate
their privileges. (CVE-2010-4160, Important)

* Integer overflow in ib_uverbs_poll_cq() could allow a local, unprivileged
user to cause a denial of service or escalate their privileges.
(CVE-2010-4649, Important)

* Missing boundary check in dvb_ca_ioctl() in the av7110 module. On systems
using old DVB cards requiring the av7110 module, a local, unprivileged user
could use this flaw to cause a denial of service or escalate their
privileges. (CVE-2011-0521, Important)

* Flaw in tcf_act_police_dump() in the network traffic policing
implementation could allow a local, unprivileged user to cause an
information leak. (CVE-2010-3477, Moderate)

* Missing boundary checks in the block layer implementation could allow a
local, unprivileged user to cause a denial of service. (CVE-2010-4162,
CVE-2010-4163, CVE-2010-4668, Moderate)

* Divide-by-zero flaw in tcp_select_initial_window() in the Linux kernel's
TCP/IP protocol suite implementation could allow a local, unprivileged user
to cause a denial of service. (CVE-2010-4165, Moderate)

* NULL pointer dereference flaw in the Bluetooth HCI UART driver could
allow a local, unprivileged user to cause a denial of service.
(CVE-2010-4242, Moderate)

* Flaw in the CPU time clocks implementation for the POSIX clock interface
could allow a local, unprivileged user to cause a denial of service.
(CVE-2010-4248, Moderate)

* Flaw in the garbage collector for AF_UNIX sockets could allow a local,
unprivileged user to trigger a denial of service (out-of-memory condition).
(CVE-2010-4249, Moderate)

* Memory leak in the inotify_init() system call. In some cases, it could
leak a group, which could allow a local, unprivileged user to eventually
cause a denial of service. (CVE-2010-4250, Moderate)

* /sys/kernel/debug/acpi/custom_method had world-writable permissions,
which could allow a local, unprivileged user to escalate their privileges.
Note: The debugfs file system must be mounted locally to exploit this
issue. It is not mounted by default. (CVE-2010-4347, Moderate)

* Heap overflow in iowarrior_write() could allow a user with access to an
IO-Warrior USB device to cause a denial of service or escalate their
privileges. (CVE-2010-4656, Moderate)

* Missing security check in the Linux kernel's implementation of the
install_special_mapping routine could allow a local, unprivileged user to
bypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low)

* Information leak in bcm_connect() in the Controller Area Network (CAN)
Broadcast Manager implementation could allow a local, unprivileged user to
leak kernel mode addresses in /proc/net/can-bcm. (CVE-2010-4565, Low)

* A logic error in orinoco_ioctl_set_auth() in the Linux kernel's ORiNOCO
wireless extensions support implementation could render TKIP
countermeasures ineffective when it is enabled, as it enabled the card
instead of shutting it down. (CVE-2010-4648, Low)

* Missing initialization flaw in ethtool_get_regs() could allow a local
user who has the CAP_NET_ADMIN capability to cause an information leak.
(CVE-2010-4655, Low)

* Flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to
cause an information leak. (CVE-2011-1044, Low)

Red Hat would like to thank Dan Rosenberg for reporting CVE-2010-4160,
CVE-2010-4162, CVE-2010-4163, CVE-2010-4668, and CVE-2010-4565
Steve Chen
for reporting CVE-2010-4165
Alan Cox for reporting CVE-2010-4242
Vegard
Nossum for reporting CVE-2010-4249 and CVE-2010-4250
Kees Cook for
reporting CVE-2010-4656 and CVE-2010-4655
and Tavis Ormandy for reporting
CVE-2010-4346.

This update also fixes three bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2011-0330.html
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/1.3/html/Technical_Notes/chap-Package_Updates.html#RHSA-2011-0330

Risk factor : High

CVSS Score:
6.9

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3477
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
http://www.securityfocus.com/archive/1/520102/100/0/threaded
Debian Security Information: DSA-2126 (Google Search)
http://www.debian.org/security/2010/dsa-2126
http://www.redhat.com/support/errata/RHSA-2010-0779.html
http://www.redhat.com/support/errata/RHSA-2010-0839.html
http://www.redhat.com/support/errata/RHSA-2011-0007.html
http://www.securitytracker.com/id?1024603
http://secunia.com/advisories/42890
http://secunia.com/advisories/46397
http://www.ubuntu.com/usn/USN-1000-1
Common Vulnerability Exposure (CVE) ID: CVE-2010-4160
BugTraq ID: 44762
http://www.securityfocus.com/bid/44762
http://xorl.wordpress.com/2010/11/11/cve-2010-4160-linux-kernel-l2tp-integer-overflows/
http://www.spinics.net/lists/netdev/msg145248.html
http://www.spinics.net/lists/netdev/msg145673.html
http://openwall.com/lists/oss-security/2010/11/10/5
http://openwall.com/lists/oss-security/2010/11/10/16
http://openwall.com/lists/oss-security/2010/11/24/12
http://openwall.com/lists/oss-security/2010/11/24/4
http://openwall.com/lists/oss-security/2010/11/24/5
http://openwall.com/lists/oss-security/2010/11/24/6
http://secunia.com/advisories/42801
http://secunia.com/advisories/42932
http://secunia.com/advisories/43056
http://secunia.com/advisories/43291
SuSE Security Announcement: SUSE-SA:2011:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html
SuSE Security Announcement: SUSE-SA:2011:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
SuSE Security Announcement: SUSE-SA:2011:005 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html
SuSE Security Announcement: SUSE-SA:2011:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html
http://www.vupen.com/english/advisories/2011/0012
http://www.vupen.com/english/advisories/2011/0124
http://www.vupen.com/english/advisories/2011/0213
http://www.vupen.com/english/advisories/2011/0375
Common Vulnerability Exposure (CVE) ID: CVE-2010-4162
BugTraq ID: 44793
http://www.securityfocus.com/bid/44793
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029
http://openwall.com/lists/oss-security/2010/11/10/18
http://openwall.com/lists/oss-security/2010/11/12/2
http://secunia.com/advisories/42745
http://secunia.com/advisories/42778
SuSE Security Announcement: SUSE-SA:2010:060 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html
SuSE Security Announcement: SUSE-SA:2011:001 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
SuSE Security Announcement: SUSE-SA:2011:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
http://www.vupen.com/english/advisories/2010/3321
http://www.vupen.com/english/advisories/2011/0298
Common Vulnerability Exposure (CVE) ID: CVE-2010-4163
http://openwall.com/lists/oss-security/2010/11/29/1
Common Vulnerability Exposure (CVE) ID: CVE-2010-4165
BugTraq ID: 44830
http://www.securityfocus.com/bid/44830
http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
http://www.spinics.net/lists/netdev/msg146495.html
http://www.spinics.net/lists/netdev/msg146405.html
http://www.openwall.com/lists/oss-security/2010/11/12/1
http://www.openwall.com/lists/oss-security/2010/11/12/4
http://www.osvdb.org/69241
http://securityreason.com/securityalert/8111
http://securityreason.com/securityalert/8123
Common Vulnerability Exposure (CVE) ID: CVE-2010-4242
BugTraq ID: 45014
http://www.securityfocus.com/bid/45014
http://xorl.wordpress.com/2010/12/01/cve-2010-4242-linux-kernel-bluetooth-hci-uart-invalid-pointer-access/
https://lkml.org/lkml/2010/10/7/255
http://www.redhat.com/support/errata/RHSA-2011-0004.html
http://www.redhat.com/support/errata/RHSA-2011-0162.html
http://secunia.com/advisories/42789
http://secunia.com/advisories/42963
http://www.vupen.com/english/advisories/2011/0024
http://www.vupen.com/english/advisories/2011/0168
XForce ISS Database: kernel-hciuartttyopen-dos(64617)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64617
Common Vulnerability Exposure (CVE) ID: CVE-2010-4248
BugTraq ID: 45028
http://www.securityfocus.com/bid/45028
http://www.openwall.com/lists/oss-security/2010/11/23/2
http://www.openwall.com/lists/oss-security/2010/11/24/9
Common Vulnerability Exposure (CVE) ID: CVE-2010-4249
BugTraq ID: 45037
http://www.securityfocus.com/bid/45037
http://www.exploit-db.com/exploits/15622/
http://lkml.org/lkml/2010/11/23/395
http://lkml.org/lkml/2010/11/23/450
http://lkml.org/lkml/2010/11/25/8
http://marc.info/?l=linux-netdev&m=129059035929046&w=2
http://www.openwall.com/lists/oss-security/2010/11/24/2
http://www.openwall.com/lists/oss-security/2010/11/24/10
http://secunia.com/advisories/42354
Common Vulnerability Exposure (CVE) ID: CVE-2010-4250
http://www.openwall.com/lists/oss-security/2010/11/24/11
Common Vulnerability Exposure (CVE) ID: CVE-2010-4346
BugTraq ID: 45323
http://www.securityfocus.com/bid/45323
https://lkml.org/lkml/2010/12/9/222
http://openwall.com/lists/oss-security/2010/12/09/13
http://openwall.com/lists/oss-security/2010/12/09/12
http://openwall.com/lists/oss-security/2010/12/10/3
http://openwall.com/lists/oss-security/2010/12/10/2
http://secunia.com/advisories/42570
Common Vulnerability Exposure (CVE) ID: CVE-2010-4347
BugTraq ID: 45408
http://www.securityfocus.com/bid/45408
http://www.exploit-db.com/exploits/15774/
http://openwall.com/lists/oss-security/2010/12/15/3
http://openwall.com/lists/oss-security/2010/12/15/7
XForce ISS Database: kernel-debugfs-privilege-esc(64155)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64155
Common Vulnerability Exposure (CVE) ID: CVE-2010-4565
BugTraq ID: 44661
http://www.securityfocus.com/bid/44661
https://bugzilla.redhat.com/show_bug.cgi?id=664544
http://www.spinics.net/lists/netdev/msg145796.html
http://www.spinics.net/lists/netdev/msg145791.html
http://www.spinics.net/lists/netdev/msg146270.html
http://www.spinics.net/lists/netdev/msg146468.html
http://openwall.com/lists/oss-security/2010/11/03/3
http://openwall.com/lists/oss-security/2010/11/04/4
http://openwall.com/lists/oss-security/2010/12/20/2
http://openwall.com/lists/oss-security/2010/12/21/1
Common Vulnerability Exposure (CVE) ID: CVE-2010-4648
http://www.openwall.com/lists/oss-security/2011/01/06/18
Common Vulnerability Exposure (CVE) ID: CVE-2010-4649
BugTraq ID: 46073
http://www.securityfocus.com/bid/46073
RedHat Security Advisories: RHSA-2011:0927
http://rhn.redhat.com/errata/RHSA-2011-0927.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-4655
BugTraq ID: 45972
http://www.securityfocus.com/bid/45972
https://lkml.org/lkml/2010/10/7/297
http://openwall.com/lists/oss-security/2011/01/24/9
http://openwall.com/lists/oss-security/2011/01/25/3
http://openwall.com/lists/oss-security/2011/01/25/4
http://openwall.com/lists/oss-security/2011/01/25/5
http://openwall.com/lists/oss-security/2011/01/28/1
http://www.ubuntu.com/usn/USN-1146-1
Common Vulnerability Exposure (CVE) ID: CVE-2010-4656
BugTraq ID: 46069
http://www.securityfocus.com/bid/46069
Common Vulnerability Exposure (CVE) ID: CVE-2010-4668
BugTraq ID: 45660
http://www.securityfocus.com/bid/45660
http://lkml.org/lkml/2010/11/29/70
http://lkml.org/lkml/2010/11/29/68
http://openwall.com/lists/oss-security/2010/11/30/4
http://openwall.com/lists/oss-security/2010/11/30/7
XForce ISS Database: linux-blkrqmapuseriov-dos(64496)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64496
Common Vulnerability Exposure (CVE) ID: CVE-2011-0521
BugTraq ID: 45986
http://www.securityfocus.com/bid/45986
http://openwall.com/lists/oss-security/2011/01/24/2
http://openwall.com/lists/oss-security/2011/01/25/2
http://www.securitytracker.com/id?1025195
http://secunia.com/advisories/43009
XForce ISS Database: kernel-av7110ca-privilege-escalation(64988)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64988
Common Vulnerability Exposure (CVE) ID: CVE-2011-1044
BugTraq ID: 46488
http://www.securityfocus.com/bid/46488
XForce ISS Database: kernel-ibuverbspollcq-info-disclosure(65563)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65563
Common Vulnerability Exposure (CVE) ID: CVE-2010-4258
http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html
http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/
https://lkml.org/lkml/2010/12/1/543
http://marc.info/?l=linux-kernel&m=129117048916957&w=2
http://openwall.com/lists/oss-security/2010/12/02/2
http://openwall.com/lists/oss-security/2010/12/02/7
http://openwall.com/lists/oss-security/2010/12/02/4
http://openwall.com/lists/oss-security/2010/12/02/3
http://openwall.com/lists/oss-security/2010/12/08/4
http://openwall.com/lists/oss-security/2010/12/08/5
http://openwall.com/lists/oss-security/2010/12/08/9
http://openwall.com/lists/oss-security/2010/12/09/14
http://openwall.com/lists/oss-security/2010/12/09/4
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2022 E-Soft Inc. All rights reserved.