[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2011-0007 -- Oracle kernel

ID: oval:org.secpod.oval:def:1503363Date: (C)2021-01-08   (M)2024-01-02
Class: PATCHFamily: unix




Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Description Buffer overflow in eCryptfs. When /dev/ecryptfs has world writable permissions , a local, unprivileged user could use this flaw to cause a denial of service or possibly escalate their privileges. Integer overflow in the RDS protocol implementation could allow a local, unprivileged user to cause a denial of service or escalate their privileges. Missing boundary checks in the PPP over L2TP sockets implementation could allow a local, unprivileged user to cause a denial of service or escalate their privileges. NULL pointer dereference in the igb driver. If both Single Root I/O Virtualization and promiscuous mode were enabled on an interface using igb, it could result in a denial of service when a tagged VLAN packet is received on that interface. Missing initialization flaw in the XFS file system implementation, and in the network traffic policing implementation, could allow a local, unprivileged user to cause an information leak. NULL pointer dereference in the Open Sound System compatible sequencer driver could allow a local, unprivileged user with access to /dev/sequencer to cause a denial of service. /dev/sequencer is only accessible to root and users in the audio group by default. Flaw in the ethtool IOCTL handler could allow a local user to cause an information leak. Flaw in bcm_connect in the Controller Area Network Broadcast Manager. On 64-bit systems, writing the socket address may overflow the procname character array. Flaw in the module for monitoring the sockets of INET transport protocols could allow a local, unprivileged user to cause a denial of service. Missing boundary checks in the block layer implementation could allow a local, unprivileged user to cause a denial of service. NULL pointer dereference in the Bluetooth HCI UART driver could allow a local, unprivileged user to cause a denial of service. Flaw in the Linux kernel CPU time clocks implementation for the POSIX clock interface could allow a local, unprivileged user to cause a denial of service. Flaw in the garbage collector for AF_UNIX sockets could allow a local, unprivileged user to trigger a denial of service. Missing upper bound integer check in the AIO implementation could allow a local, unprivileged user to cause an information leak. Missing initialization flaws could lead to information leaks. Missing initialization flaw in KVM could allow a privileged host user with access to /dev/kvm to cause an information leak. Red Hat would like to thank Andre Osterhues for reporting CVE-2010-2492; Thomas Pollet for reporting CVE-2010-3865; Dan Rosenberg for reporting CVE-2010-4160, CVE-2010-3078, CVE-2010-3874, CVE-2010-4162, CVE-2010-4163, CVE-2010-3298, CVE-2010-4073, CVE-2010-4074, CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080, CVE-2010-4081, CVE-2010-4082, CVE-2010-4083, and CVE-2010-4158; Kosuke Tatsukawa for reporting CVE-2010-4263; Tavis Ormandy for reporting CVE-2010-3080 and CVE-2010-3067; Kees Cook for reporting CVE-2010-3861 and CVE-2010-4072; Nelson Elhage for reporting CVE-2010-3880; Alan Cox for reporting CVE-2010-4242; Vegard Nossum for reporting CVE-2010-4249; Vasiliy Kulikov for reporting CVE-2010-3876; and Stephan Mueller of atsec information security for reporting CVE-2010-4525.

Platform:
Oracle Linux 6
Product:
kernel
Reference:
ELSA-2011-0007
CVE-2010-3705
CVE-2010-3301
CVE-2010-3081
CVE-2010-4525
CVE-2010-4263
CVE-2010-4248
CVE-2010-3084
CVE-2010-4163
CVE-2010-4081
CVE-2010-4075
CVE-2010-4072
CVE-2010-3880
CVE-2010-3432
CVE-2010-4668
CVE-2010-3080
CVE-2010-3078
CVE-2010-3698
CVE-2010-2962
CVE-2010-4242
CVE-2010-4162
CVE-2010-4158
CVE-2010-3876
CVE-2010-3874
CVE-2010-3861
CVE-2010-3437
CVE-2010-4074
CVE-2010-3298
CVE-2010-3079
CVE-2010-3865
CVE-2010-3904
CVE-2010-3442
CVE-2010-2955
CVE-2010-2803
CVE-2010-4249
CVE-2010-4160
CVE-2010-4083
CVE-2010-4082
CVE-2010-4080
CVE-2010-4079
CVE-2010-4077
CVE-2010-4073
CVE-2010-3477
CVE-2010-3067
CVE-2010-2492
CVE    44
CVE-2010-4525
CVE-2010-4077
CVE-2010-4263
CVE-2010-2492
...
CPE    15
cpe:/o:linux:linux_kernel
cpe:/o:linux:linux_kernel:2.6.37:rc5
cpe:/o:linux:linux_kernel:2.6.37:rc6
cpe:/o:linux:linux_kernel:2.6.37:rc3
...

© SecPod Technologies