[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2013-148 ---- kernel nvidia

ID: oval:org.secpod.oval:def:1600296Date: (C)2016-05-19   (M)2024-02-19
Class: PATCHFamily: unix




A malicious Network File System version 4 server could return a crafted reply to a GETACL request, causing a denial of service on the client. A divide-by-zero flaw was found in the TCP Illinois congestion control algorithm implementation in the Linux kernel. If the TCP Illinois congestion control algorithm were in use , a local, unprivileged user could trigger this flaw and cause a denial of service. A NULL pointer dereference flaw was found in the way a new node"s hot added memory was propagated to other nodes" zonelists. By utilizing this newly added memory from one of the remaining nodes, a local, unprivileged user could use this flaw to cause a denial of service. It was found that a prevoius kernel release did not correctly fix the CVE-2009-4307 issue, a divide-by-zero flaw in the ext4 file system code. A local, unprivileged user with the ability to mount an ext4 file system could use this flaw to cause a denial of service. A flaw was found in the way the Linux kernel"s IPv6 implementation handled overlapping, fragmented IPv6 packets. A remote attacker could potentially use this flaw to bypass protection mechanisms when sending network packets to a target system

Platform:
Amazon Linux AMI
Product:
kernel
nvidia
Reference:
ALAS-2013-148
CVE-2012-5517
CVE-2012-4565
CVE-2012-4444
CVE-2012-2375
CVE-2012-2100
CVE    5
CVE-2012-2100
CVE-2012-2375
CVE-2012-4444
CVE-2012-4565
...
CPE    360
cpe:/o:linux:linux_kernel:2.6.33:rc8
cpe:/o:linux:linux_kernel:3.0.40
cpe:/o:linux:linux_kernel:2.6.33:rc7
cpe:/o:linux:linux_kernel:3.1.10
...

© SecPod Technologies