First published: Tue Jan 11 2011(Updated: )
<li> Buffer overflow in eCryptfs. When /dev/ecryptfs has world writable</li> permissions (which it does not, by default, on Red Hat Enterprise Linux 6),<br>a local, unprivileged user could use this flaw to cause a denial of service<br>or possibly escalate their privileges. (CVE-2010-2492, Important)<br><li> Integer overflow in the RDS protocol implementation could allow a local,</li> unprivileged user to cause a denial of service or escalate their<br>privileges. (CVE-2010-3865, Important)<br><li> Missing boundary checks in the PPP over L2TP sockets implementation could</li> allow a local, unprivileged user to cause a denial of service or escalate<br>their privileges. (CVE-2010-4160, Important)<br><li> NULL pointer dereference in the igb driver. If both Single Root I/O</li> Virtualization (SR-IOV) and promiscuous mode were enabled on an interface<br>using igb, it could result in a denial of service when a tagged VLAN packet<br>is received on that interface. (CVE-2010-4263, Important)<br><li> Missing initialization flaw in the XFS file system implementation, and in</li> the network traffic policing implementation, could allow a local,<br>unprivileged user to cause an information leak. (CVE-2010-3078,<br>CVE-2010-3477, Moderate)<br><li> NULL pointer dereference in the Open Sound System compatible sequencer</li> driver could allow a local, unprivileged user with access to /dev/sequencer<br>to cause a denial of service. /dev/sequencer is only accessible to root and<br>users in the audio group by default. (CVE-2010-3080, Moderate)<br><li> Flaw in the ethtool IOCTL handler could allow a local user to cause an</li> information leak. (CVE-2010-3861, Moderate)<br><li> Flaw in bcm_connect() in the Controller Area Network (CAN) Broadcast</li> Manager. On 64-bit systems, writing the socket address may overflow the<br>procname character array. (CVE-2010-3874, Moderate)<br><li> Flaw in the module for monitoring the sockets of INET transport</li> protocols could allow a local, unprivileged user to cause a denial of<br>service. (CVE-2010-3880, Moderate)<br><li> Missing boundary checks in the block layer implementation could allow a</li> local, unprivileged user to cause a denial of service. (CVE-2010-4162,<br>CVE-2010-4163, CVE-2010-4668, Moderate)<br><li> NULL pointer dereference in the Bluetooth HCI UART driver could allow a</li> local, unprivileged user to cause a denial of service. (CVE-2010-4242,<br>Moderate)<br><li> Flaw in the Linux kernel CPU time clocks implementation for the POSIX</li> clock interface could allow a local, unprivileged user to cause a denial of<br>service. (CVE-2010-4248, Moderate)<br><li> Flaw in the garbage collector for AF_UNIX sockets could allow a local,</li> unprivileged user to trigger a denial of service. (CVE-2010-4249, Moderate)<br><li> Missing upper bound integer check in the AIO implementation could allow a</li> local, unprivileged user to cause an information leak. (CVE-2010-3067, Low)<br><li> Missing initialization flaws could lead to information leaks.</li> (CVE-2010-3298, CVE-2010-3876, CVE-2010-4072, CVE-2010-4073, CVE-2010-4074,<br>CVE-2010-4075, CVE-2010-4077, CVE-2010-4079, CVE-2010-4080, CVE-2010-4081,<br>CVE-2010-4082, CVE-2010-4083, CVE-2010-4158, Low)<br><li> Missing initialization flaw in KVM could allow a privileged host user</li> with access to /dev/kvm to cause an information leak. (CVE-2010-4525, Low)<br>Red Hat would like to thank Andre Osterhues for reporting CVE-2010-2492;<br>Thomas Pollet for reporting CVE-2010-3865; Dan Rosenberg for reporting<br>CVE-2010-4160, CVE-2010-3078, CVE-2010-3874, CVE-2010-4162, CVE-2010-4163,<br>CVE-2010-3298, CVE-2010-4073, CVE-2010-4074, CVE-2010-4075, CVE-2010-4077,<br>CVE-2010-4079, CVE-2010-4080, CVE-2010-4081, CVE-2010-4082, CVE-2010-4083,<br>and CVE-2010-4158; Kosuke Tatsukawa for reporting CVE-2010-4263; Tavis<br>Ormandy for reporting CVE-2010-3080 and CVE-2010-3067; Kees Cook for<br>reporting CVE-2010-3861 and CVE-2010-4072; Nelson Elhage for reporting<br>CVE-2010-3880; Alan Cox for reporting CVE-2010-4242; Vegard Nossum for<br>reporting CVE-2010-4249; Vasiliy Kulikov for reporting CVE-2010-3876; and<br>Stephan Mueller of atsec information security for reporting CVE-2010-4525.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debug | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debug-devel | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debuginfo | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-devel | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-doc | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-firmware | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-headers | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/perf | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debug | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debug-devel | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debuginfo | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-devel | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-headers | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-kdump | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-bootwrapper | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-71.14.1.el6 | 2.6.32-71.14.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.