SCIENTIFIC-LINUX-ERRATA Archives

November 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Wed, 7 Nov 2012 10:19:41 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (59 lines)
Synopsis:          Moderate: kernel security and bug fix update
Issue Date:        2012-11-06
CVE Numbers:       CVE-2012-1568
                    CVE-2012-2133
                    CVE-2012-3400
                    CVE-2012-3511
--
This update fixes the following security issues:

* A use-after-free flaw was found in the Linux kernel's memory management
subsystem in the way quota handling for huge pages was performed. A local,
unprivileged user could use this flaw to cause a denial of service or,
potentially, escalate their privileges. (CVE-2012-2133, Moderate)

* A use-after-free flaw was found in the madvise() system call
implementation in the Linux kernel. A local, unprivileged user could use
this flaw to cause a denial of service or, potentially, escalate their
privileges. (CVE-2012-3511, Moderate)

* It was found that when running a 32-bit binary that uses a large number
of shared libraries, one of the libraries would always be loaded at a
predictable address in memory. An attacker could use this flaw to bypass
the Address Space Layout Randomization (ASLR) security feature.
(CVE-2012-1568, Low)

* Buffer overflow flaws were found in the udf_load_logicalvol() function
in the Universal Disk Format (UDF) file system implementation in the Linux
kernel. An attacker with physical access to a system could use these flaws
to cause a denial of service or escalate their privileges. (CVE-2012-3400,
Low)

This update also fixes several bugs.

The system must be rebooted for this update to take effect.
--

SL6
   x86_64
     kernel-2.6.32-279.14.1.el6.x86_64.rpm
     kernel-debug-2.6.32-279.14.1.el6.x86_64.rpm
     kernel-debug-devel-2.6.32-279.14.1.el6.x86_64.rpm
     kernel-devel-2.6.32-279.14.1.el6.x86_64.rpm
     kernel-headers-2.6.32-279.14.1.el6.x86_64.rpm
     perf-2.6.32-279.14.1.el6.x86_64.rpm
     python-perf-2.6.32-279.14.1.el6.x86_64.rpm
   i386
     kernel-2.6.32-279.14.1.el6.i686.rpm
     kernel-debug-2.6.32-279.14.1.el6.i686.rpm
     kernel-debug-devel-2.6.32-279.14.1.el6.i686.rpm
     kernel-devel-2.6.32-279.14.1.el6.i686.rpm
     kernel-headers-2.6.32-279.14.1.el6.i686.rpm
     perf-2.6.32-279.14.1.el6.i686.rpm
     python-perf-2.6.32-279.14.1.el6.i686.rpm
   noarch
     kernel-doc-2.6.32-279.14.1.el6.noarch.rpm
     kernel-firmware-2.6.32-279.14.1.el6.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2