Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2012.1679.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2012:1679-1)
Summary:The remote host is missing an update for the 'Linux kernel' package(s) announced via the SUSE-SU-2012:1679-1 advisory.
Description:Summary:
The remote host is missing an update for the 'Linux kernel' package(s) announced via the SUSE-SU-2012:1679-1 advisory.

Vulnerability Insight:
The SUSE Linux Enterprise 11 SP2 kernel has been updated to 3.0.51 which fixes various bugs and security issues.

It contains the following feature enhancements:

* The cachefiles framework is now supported
(FATE#312793, bnc#782369). The userland utilities were published seperately to support this feature.
* The ipset netfilter modules are now supported
(FATE#313309) The ipset userland utility will be published seperately to support this feature.
* The tipc kernel module is now externally supported
(FATE#305033).
* Hyper-V KVP IP injection was implemented
(FATE#314441). A seperate hyper-v package will be published to support this feature.
* Intel Lynx Point PCH chipset support was added.
(FATE#313409)
*

Enable various md/raid10 and DASD enhancements.
(FATE#311379) These make it possible for RAID10 to cope with DASD devices being slow for various reasons - the affected device will be temporarily removed from the array.

Also added support for reshaping of RAID10 arrays.

mdadm changes will be published to support this feature.

The following security issues have been fixed:

* CVE-2012-5517: A race condition on hot adding memory could be used by local attackers to crash the system during hot adding new memory.
* CVE-2012-4461: A flaw has been found in the way Linux kernels KVM subsystem handled vcpu->arch.cr4 X86_CR4_OSXSAVE bit set upon guest enter. On hosts without the XSAVE feature and using qemu userspace an unprivileged local user could have used this flaw to crash the system.
* CVE-2012-1601: The KVM implementation in the Linux kernel allowed host OS users to cause a denial of service
(NULL pointer dereference and host OS crash) by making a KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already exists.
* CVE-2012-2372: Attempting an rds connection from the IP address of an IPoIB interface to itself causes a kernel panic due to a BUG_ON() being triggered. Making the test less strict allows rds-ping to work without crashing the machine. A local unprivileged user could use this flaw to crash the system.
* CVE-2012-4508: Dimitry Monakhov, one of the ext4 developers, has discovered a race involving asynchronous I/O and fallocate which can lead to the exposure of stale data --- that is, an extent which should have had the
'uninitialized' bit set indicating that its blocks have not yet been written and thus contain data from a deleted file will get exposed to anyone with read access to the file.
* CVE-2012-3430: The rds_recvmsg function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket.
* CVE-2012-3412: The sfc (aka Solarflare Solarstorm)
driver in the Linux kernel allowed remote attackers to cause a denial of service (DMA descriptor consumption and network-controlle... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Linux kernel' package(s) on SUSE Linux Enterprise Server 11 SP2, SUSE Linux Enterprise High Availability Extension 11 SP2, SUSE Linux Enterprise Desktop 11 SP2, SLE 11

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-1601
Debian Security Information: DSA-2469 (Google Search)
http://www.debian.org/security/2012/dsa-2469
http://www.openwall.com/lists/oss-security/2012/03/30/1
RedHat Security Advisories: RHSA-2012:0571
http://rhn.redhat.com/errata/RHSA-2012-0571.html
RedHat Security Advisories: RHSA-2012:0676
http://rhn.redhat.com/errata/RHSA-2012-0676.html
http://www.securitytracker.com/id?1026897
http://secunia.com/advisories/49928
SuSE Security Announcement: SUSE-SU-2012:1679 (Google Search)
https://www.suse.com/support/update/announcement/2012/suse-su-20121679-1.html
SuSE Security Announcement: openSUSE-SU-2013:0925 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-2372
BugTraq ID: 54062
http://www.securityfocus.com/bid/54062
HPdes Security Advisory: HPSBGN02970
http://marc.info/?l=bugtraq&m=139447903326211&w=2
RedHat Security Advisories: RHSA-2012:0743
http://rhn.redhat.com/errata/RHSA-2012-0743.html
RedHat Security Advisories: RHSA-2012:1540
http://rhn.redhat.com/errata/RHSA-2012-1540.html
http://ubuntu.com/usn/usn-1529-1
http://www.ubuntu.com/usn/USN-1555-1
http://www.ubuntu.com/usn/USN-1556-1
Common Vulnerability Exposure (CVE) ID: CVE-2012-3412
http://www.openwall.com/lists/oss-security/2012/08/03/4
RedHat Security Advisories: RHSA-2012:1323
http://rhn.redhat.com/errata/RHSA-2012-1323.html
RedHat Security Advisories: RHSA-2012:1324
http://rhn.redhat.com/errata/RHSA-2012-1324.html
RedHat Security Advisories: RHSA-2012:1347
http://rhn.redhat.com/errata/RHSA-2012-1347.html
RedHat Security Advisories: RHSA-2012:1375
http://rhn.redhat.com/errata/RHSA-2012-1375.html
RedHat Security Advisories: RHSA-2012:1401
http://rhn.redhat.com/errata/RHSA-2012-1401.html
RedHat Security Advisories: RHSA-2012:1430
http://rhn.redhat.com/errata/RHSA-2012-1430.html
http://secunia.com/advisories/50633
http://secunia.com/advisories/50732
http://secunia.com/advisories/50811
http://secunia.com/advisories/51193
SuSE Security Announcement: openSUSE-SU-2012:1330 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html
http://www.ubuntu.com/usn/USN-1567-1
http://www.ubuntu.com/usn/USN-1568-1
http://www.ubuntu.com/usn/USN-1572-1
http://www.ubuntu.com/usn/USN-1575-1
http://www.ubuntu.com/usn/USN-1577-1
http://www.ubuntu.com/usn/USN-1578-1
http://www.ubuntu.com/usn/USN-1579-1
http://www.ubuntu.com/usn/USN-1580-1
Common Vulnerability Exposure (CVE) ID: CVE-2012-3430
http://www.openwall.com/lists/oss-security/2012/07/26/5
Common Vulnerability Exposure (CVE) ID: CVE-2012-4461
BugTraq ID: 56414
http://www.securityfocus.com/bid/56414
http://article.gmane.org/gmane.comp.emulators.kvm.devel/100742
http://www.openwall.com/lists/oss-security/2012/11/06/14
RedHat Security Advisories: RHSA-2013:0223
http://rhn.redhat.com/errata/RHSA-2013-0223.html
RedHat Security Advisories: RHSA-2013:0882
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://secunia.com/advisories/51160
Common Vulnerability Exposure (CVE) ID: CVE-2012-4508
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091110.html
http://www.openwall.com/lists/oss-security/2012/10/25/1
RedHat Security Advisories: RHSA-2013:0496
http://rhn.redhat.com/errata/RHSA-2013-0496.html
RedHat Security Advisories: RHSA-2013:1519
http://rhn.redhat.com/errata/RHSA-2013-1519.html
RedHat Security Advisories: RHSA-2013:1783
http://rhn.redhat.com/errata/RHSA-2013-1783.html
http://www.ubuntu.com/usn/USN-1645-1
http://www.ubuntu.com/usn/USN-1899-1
http://www.ubuntu.com/usn/USN-1900-1
Common Vulnerability Exposure (CVE) ID: CVE-2012-5517
BugTraq ID: 56527
http://www.securityfocus.com/bid/56527
http://www.openwall.com/lists/oss-security/2012/11/13/11
RedHat Security Advisories: RHSA-2012:1580
http://rhn.redhat.com/errata/RHSA-2012-1580.html
http://www.ubuntu.com/usn/USN-1671-1
http://www.ubuntu.com/usn/USN-1673-1
http://www.ubuntu.com/usn/USN-1677-1
http://www.ubuntu.com/usn/USN-1678-1
http://www.ubuntu.com/usn/USN-1679-1
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.