Lucene search

K
centosCentOS ProjectCESA-2011:1479
HistoryNov 30, 2011 - 10:33 a.m.

kernel security update

2011-11-3010:33:41
CentOS Project
lists.centos.org
57

6.5 Medium

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

54.6%

CentOS Errata and Security Advisory CESA-2011:1479

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issues:

  • Using PCI passthrough without interrupt remapping support allowed Xen
    hypervisor guests to generate MSI interrupts and thus potentially inject
    traps. A privileged guest user could use this flaw to crash the host or
    possibly escalate their privileges on the host. The fix for this issue can
    prevent PCI passthrough working and guests starting. Refer to Red Hat
    Bugzilla bug 715555 for details. (CVE-2011-1898, Important)

  • A flaw was found in the way CIFS (Common Internet File System) shares
    with DFS referrals at their root were handled. An attacker on the local
    network who is able to deploy a malicious CIFS server could create a CIFS
    network share that, when mounted, would cause the client system to crash.
    (CVE-2011-3363, Moderate)

  • A NULL pointer dereference flaw was found in the way the Linux kernel’s
    key management facility handled user-defined key types. A local,
    unprivileged user could use the keyctl utility to cause a denial of
    service. (CVE-2011-4110, Moderate)

  • A flaw in the way memory containing security-related data was handled in
    tpm_read() could allow a local, unprivileged user to read the results of a
    previously run TPM command. (CVE-2011-1162, Low)

  • A NULL pointer dereference flaw was found in the Linux kernel’s HFS file
    system implementation. A local attacker could use this flaw to cause a
    denial of service by mounting a disk that contains a specially-crafted HFS
    file system with a corrupted MDB extent record. (CVE-2011-2203, Low)

  • The I/O statistics from the taskstats subsystem could be read without
    any restrictions. A local, unprivileged user could use this flaw to gather
    confidential information, such as the length of a password used in a
    process. (CVE-2011-2494, Low)

Red Hat would like to thank Yogesh Sharma for reporting CVE-2011-3363;
Peter Huewe for reporting CVE-2011-1162; Clement Lecigne for reporting
CVE-2011-2203; and Vasiliy Kulikov of Openwall for reporting CVE-2011-2494.

This update also fixes several bugs and adds one enhancement. Documentation
for these changes will be available shortly from the Technical Notes
document linked to in the References section.

Users should upgrade to these updated packages, which contain backported
patches to correct these issues, and fix the bugs and add the enhancement
noted in the Technical Notes. The system must be rebooted for this update
to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-November/080424.html
https://lists.centos.org/pipermail/centos-announce/2011-November/080426.html

Affected packages:
kernel
kernel-PAE
kernel-PAE-devel
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-headers
kernel-xen
kernel-xen-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:1479

6.5 Medium

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:M/Au:S/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

54.6%