Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Moderate: kernel on SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Wednesday 19th December 2012 15:45:12 UTC (over 3 years ago)
Synopsis:          Moderate: kernel security, bug fix and enhancement
update
Issue Date:        2012-12-18
CVE Numbers:       CVE-2012-2100
                    CVE-2012-4565
                    CVE-2012-2375
                    CVE-2012-4444
                    CVE-2012-5517
--

This update fixes the following security issues:

* It was found that a previous update did not correctly fix the 
CVE-2011-4131
issue. A malicious Network File System version 4 (NFSv4) server could
return
a crafted reply to a GETACL request, causing a denial of service on the 
client.
(CVE-2012-2375, Moderate)

* A divide-by-zero flaw was found in the TCP Illinois congestion control
algorithm implementation in the Linux kernel. If the TCP Illinois
congestion
control algorithm were in use (the sysctl net.ipv4.tcp_congestion_control
variable set to "illinois"), a local, unprivileged user could trigger 
this flaw
and cause a denial of service. (CVE-2012-4565, Moderate)

* A NULL pointer dereference flaw was found in the way a new node's hot 
added
memory was propagated to other nodes' zonelists. By utilizing this newly 
added
memory from one of the remaining nodes, a local, unprivileged user could
use
this flaw to cause a denial of service. (CVE-2012-5517, Moderate)

* It was found that the initial release of Scientific Linux 6 did not 
correctly
fix the CVE-2009-4307 issue, a divide-by-zero flaw in the ext4 file system
code. A local, unprivileged user with the ability to mount an ext4 file 
system
could use this flaw to cause a denial of service. (CVE-2012-2100, Low)

* A flaw was found in the way the Linux kernel's IPv6 implementation
handled
overlapping, fragmented IPv6 packets. A remote attacker could 
potentially use
this flaw to bypass protection mechanisms (such as a firewall or intrusion
detection system (IDS)) when sending network packets to a target system.
(CVE-2012-4444, Low)

The system must be rebooted for this update to take effect.
--

SL6
   x86_64
     kernel-2.6.32-279.19.1.el6.x86_64.rpm
     kernel-debug-2.6.32-279.19.1.el6.x86_64.rpm
     kernel-debug-debuginfo-2.6.32-279.19.1.el6.x86_64.rpm
     kernel-debug-devel-2.6.32-279.19.1.el6.x86_64.rpm
     kernel-debuginfo-2.6.32-279.19.1.el6.x86_64.rpm
     kernel-debuginfo-common-x86_64-2.6.32-279.19.1.el6.x86_64.rpm
     kernel-devel-2.6.32-279.19.1.el6.x86_64.rpm
     kernel-headers-2.6.32-279.19.1.el6.x86_64.rpm
     perf-2.6.32-279.19.1.el6.x86_64.rpm
     perf-debuginfo-2.6.32-279.19.1.el6.x86_64.rpm
     python-perf-debuginfo-2.6.32-279.19.1.el6.x86_64.rpm
     python-perf-2.6.32-279.19.1.el6.x86_64.rpm
   i386
     kernel-2.6.32-279.19.1.el6.i686.rpm
     kernel-debug-2.6.32-279.19.1.el6.i686.rpm
     kernel-debug-debuginfo-2.6.32-279.19.1.el6.i686.rpm
     kernel-debug-devel-2.6.32-279.19.1.el6.i686.rpm
     kernel-debuginfo-2.6.32-279.19.1.el6.i686.rpm
     kernel-debuginfo-common-i686-2.6.32-279.19.1.el6.i686.rpm
     kernel-devel-2.6.32-279.19.1.el6.i686.rpm
     kernel-headers-2.6.32-279.19.1.el6.i686.rpm
     perf-2.6.32-279.19.1.el6.i686.rpm
     perf-debuginfo-2.6.32-279.19.1.el6.i686.rpm
     python-perf-debuginfo-2.6.32-279.19.1.el6.i686.rpm
     python-perf-2.6.32-279.19.1.el6.i686.rpm
   noarch
     kernel-doc-2.6.32-279.19.1.el6.noarch.rpm
     kernel-firmware-2.6.32-279.19.1.el6.noarch.rpm

- Scientific Linux Development Team
 
CD: 3ms