CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
EPSS
Percentile
90.7%
Issue Overview:
A use-after-free flaw was found in the Linux kernel’s memory management subsystem in the way quota handling for huge pages was performed. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2012-2133, Moderate)
A use-after-free flaw was found in the madvise() system call implementation in the Linux kernel. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2012-3511, Moderate)
It was found that when running a 32-bit binary that uses a large number of shared libraries, one of the libraries would always be loaded at a predictable address in memory. An attacker could use this flaw to bypass the Address Space Layout Randomization (ASLR) security feature. (CVE-2012-1568, Low)
Buffer overflow flaws were found in the udf_load_logicalvol() function in the Universal Disk Format (UDF) file system implementation in the Linux kernel. An attacker with physical access to a system could use these flaws to cause a denial of service or escalate their privileges. (CVE-2012-3400, Low)
Affected Packages:
kernel
Issue Correction:
Run yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.
New Packages:
i686:
kernel-devel-3.2.34-55.46.amzn1.i686
kernel-debuginfo-3.2.34-55.46.amzn1.i686
kernel-3.2.34-55.46.amzn1.i686
kernel-tools-3.2.34-55.46.amzn1.i686
kernel-headers-3.2.34-55.46.amzn1.i686
kernel-debuginfo-common-i686-3.2.34-55.46.amzn1.i686
kernel-tools-debuginfo-3.2.34-55.46.amzn1.i686
noarch:
kernel-doc-3.2.34-55.46.amzn1.noarch
src:
kernel-3.2.34-55.46.amzn1.src
x86_64:
kernel-devel-3.2.34-55.46.amzn1.x86_64
kernel-tools-3.2.34-55.46.amzn1.x86_64
kernel-debuginfo-3.2.34-55.46.amzn1.x86_64
kernel-headers-3.2.34-55.46.amzn1.x86_64
kernel-debuginfo-common-x86_64-3.2.34-55.46.amzn1.x86_64
kernel-3.2.34-55.46.amzn1.x86_64
kernel-tools-debuginfo-3.2.34-55.46.amzn1.x86_64
Red Hat: CVE-2012-0957, CVE-2012-1568, CVE-2012-2133, CVE-2012-3400, CVE-2012-3511, CVE-2012-4508, CVE-2012-4565
Mitre: CVE-2012-0957, CVE-2012-1568, CVE-2012-2133, CVE-2012-3400, CVE-2012-3511, CVE-2012-4508, CVE-2012-4565
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | kernel-devel | < 3.2.34-55.46.amzn1 | kernel-devel-3.2.34-55.46.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | kernel-debuginfo | < 3.2.34-55.46.amzn1 | kernel-debuginfo-3.2.34-55.46.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | kernel | < 3.2.34-55.46.amzn1 | kernel-3.2.34-55.46.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | kernel-tools | < 3.2.34-55.46.amzn1 | kernel-tools-3.2.34-55.46.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | kernel-headers | < 3.2.34-55.46.amzn1 | kernel-headers-3.2.34-55.46.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | kernel-debuginfo-common-i686 | < 3.2.34-55.46.amzn1 | kernel-debuginfo-common-i686-3.2.34-55.46.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | kernel-tools-debuginfo | < 3.2.34-55.46.amzn1 | kernel-tools-debuginfo-3.2.34-55.46.amzn1.i686.rpm |
Amazon Linux | 1 | noarch | kernel-doc | < 3.2.34-55.46.amzn1 | kernel-doc-3.2.34-55.46.amzn1.noarch.rpm |
Amazon Linux | 1 | x86_64 | kernel-devel | < 3.2.34-55.46.amzn1 | kernel-devel-3.2.34-55.46.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | kernel-tools | < 3.2.34-55.46.amzn1 | kernel-tools-3.2.34-55.46.amzn1.x86_64.rpm |