Executive Summary
Summary | |
---|---|
Title | Linux kernel vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-1606-1 | First vendor Publication | 2012-10-11 |
Vendor | Ubuntu | Last vendor Modification | 2012-10-11 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.9 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 10.04 LTS Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: A flaw was found in how the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem handled MSI (Message Signaled Interrupts). A local unprivileged user could exploit this flaw to cause a denial of service or potentially elevate privileges. (CVE-2012-2137) A flaw was found in how the Linux kernel passed the replacement session keyring to a child process. An unprivileged local user could exploit this flaw to cause a denial of service (panic). (CVE-2012-2745) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 10.04 LTS: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-1606-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17409 | |||
Oval ID: | oval:org.mitre.oval:def:17409 | ||
Title: | USN-1452-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1452-1 CVE-2012-1601 CVE-2012-2123 CVE-2012-2745 | Version: | 7 |
Platform(s): | Ubuntu 11.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17712 | |||
Oval ID: | oval:org.mitre.oval:def:17712 | ||
Title: | USN-1460-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1460-1 CVE-2012-1601 CVE-2012-2123 CVE-2012-2745 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17887 | |||
Oval ID: | oval:org.mitre.oval:def:17887 | ||
Title: | USN-1455-1 -- linux-lts-backport-oneiric vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1455-1 CVE-2012-1601 CVE-2012-2123 CVE-2012-2745 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-lts-backport-oneiric |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17915 | |||
Oval ID: | oval:org.mitre.oval:def:17915 | ||
Title: | USN-1459-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1459-1 CVE-2012-1601 CVE-2012-2123 CVE-2012-2745 | Version: | 7 |
Platform(s): | Ubuntu 11.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17943 | |||
Oval ID: | oval:org.mitre.oval:def:17943 | ||
Title: | USN-1448-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1448-1 CVE-2012-1601 CVE-2012-2123 CVE-2012-2745 | Version: | 7 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17982 | |||
Oval ID: | oval:org.mitre.oval:def:17982 | ||
Title: | USN-1597-1 -- linux-ec2 vulnerability | ||
Description: | The system could be made to crash under certain conditions. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1597-1 CVE-2012-2745 | Version: | 7 |
Platform(s): | Ubuntu 10.04 | Product(s): | linux-ec2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27400 | |||
Oval ID: | oval:org.mitre.oval:def:27400 | ||
Title: | DEPRECATED: ELSA-2012-1064 -- kernel security and bug fix update (important) | ||
Description: | [2.6.32-279.1.1.el6] - [kernel] Prevent keyctl new_session from causing a panic (David Howells) [833433 827424] {CVE-2012-2745} - [net] ipv6/netfilter: fix null pointer dereference in nf_ct_frag6_reasm() (Petr Matousek) [833410 833412] {CVE-2012-2744} - [fs] nfs: Map minor mismatch error to protocol not support error (Steve Dickson) [832365 796352] - [fs] ext4: Fix overflow caused by missing cast in ext4_fallocate() (Lukas Czerner) [833034 830209] - [ata] libata: Add 2GB ATA Flash Disk/ADMA428M to DMA blacklist (Prarit Bhargava) [832363 812904] - [netdrv] r8169: fix typo in firmware filenames (Ivan Vecera) [832359 829211] | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2012-1064 CVE-2012-2744 CVE-2012-2745 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | kernel |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-10-16 | Name : Ubuntu Update for linux-ti-omap4 USN-1609-1 File : nvt/gb_ubuntu_USN_1609_1.nasl |
2012-10-12 | Name : Ubuntu Update for linux USN-1606-1 File : nvt/gb_ubuntu_USN_1606_1.nasl |
2012-10-12 | Name : Ubuntu Update for linux USN-1607-1 File : nvt/gb_ubuntu_USN_1607_1.nasl |
2012-10-05 | Name : Ubuntu Update for linux-lts-backport-oneiric USN-1594-1 File : nvt/gb_ubuntu_USN_1594_1.nasl |
2012-10-05 | Name : Ubuntu Update for linux-ec2 USN-1597-1 File : nvt/gb_ubuntu_USN_1597_1.nasl |
2012-09-22 | Name : Ubuntu Update for linux-lts-backport-natty USN-1574-1 File : nvt/gb_ubuntu_USN_1574_1.nasl |
2012-09-17 | Name : Ubuntu Update for linux USN-1567-1 File : nvt/gb_ubuntu_USN_1567_1.nasl |
2012-08-14 | Name : Ubuntu Update for linux-ti-omap4 USN-1514-1 File : nvt/gb_ubuntu_USN_1514_1.nasl |
2012-08-14 | Name : Ubuntu Update for linux USN-1529-1 File : nvt/gb_ubuntu_USN_1529_1.nasl |
2012-07-30 | Name : CentOS Update for kernel CESA-2012:0743 centos6 File : nvt/gb_CESA-2012_0743_kernel_centos6.nasl |
2012-07-30 | Name : CentOS Update for kernel CESA-2012:1064 centos6 File : nvt/gb_CESA-2012_1064_kernel_centos6.nasl |
2012-07-16 | Name : RedHat Update for kernel RHSA-2012:1064-01 File : nvt/gb_RHSA-2012_1064-01_kernel.nasl |
2012-06-19 | Name : RedHat Update for kernel RHSA-2012:0743-01 File : nvt/gb_RHSA-2012_0743-01_kernel.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2012-0042.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-176.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-124.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0743.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-1064.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-2020.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-2021.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-2025.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-2026.nasl - Type : ACT_GATHER_INFO |
2013-05-08 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-130426.nasl - Type : ACT_GATHER_INFO |
2013-01-25 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-121010.nasl - Type : ACT_GATHER_INFO |
2012-10-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1609-1.nasl - Type : ACT_GATHER_INFO |
2012-10-12 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1607-1.nasl - Type : ACT_GATHER_INFO |
2012-10-12 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1606-1.nasl - Type : ACT_GATHER_INFO |
2012-10-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1597-1.nasl - Type : ACT_GATHER_INFO |
2012-10-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1594-1.nasl - Type : ACT_GATHER_INFO |
2012-09-20 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1574-1.nasl - Type : ACT_GATHER_INFO |
2012-09-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1567-1.nasl - Type : ACT_GATHER_INFO |
2012-08-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1514-1.nasl - Type : ACT_GATHER_INFO |
2012-08-13 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1529-1.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120710_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120618_kernel_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-07-12 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-1064.nasl - Type : ACT_GATHER_INFO |
2012-07-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-1064.nasl - Type : ACT_GATHER_INFO |
2012-06-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0743.nasl - Type : ACT_GATHER_INFO |
2012-06-19 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0743.nasl - Type : ACT_GATHER_INFO |
2012-05-30 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1455-1.nasl - Type : ACT_GATHER_INFO |
2012-05-29 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1452-1.nasl - Type : ACT_GATHER_INFO |
2012-05-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1448-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:00:56 |
|
2013-01-23 17:22:14 |
|
2013-01-23 13:23:25 |
|