SB2012051701 - Multiple vulnerabilities in Linux kernel 



SB2012051701 - Multiple vulnerabilities in Linux kernel

Published: May 17, 2012 Updated: August 11, 2020

Security Bulletin ID SB2012051701
Severity
High
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 9% Medium 73% Low 18%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Improper Initialization (CVE-ID: CVE-2011-4087)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The br_parse_ip_options function in net/bridge/br_netfilter.c in the Linux kernel before 2.6.39 does not properly initialize a certain data structure, which allows remote attackers to cause a denial of service by leveraging connectivity to a network interface that uses an Ethernet bridge device.


2) Out-of-bounds write (CVE-ID: CVE-2011-1180)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.


3) Input validation error (CVE-ID: CVE-2011-1182)

The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.

kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.


4) Resource management error (CVE-ID: CVE-2011-2479)

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

The Linux kernel before 2.6.39 does not properly create transparent huge pages in response to a MAP_PRIVATE mmap system call on /dev/zero, which allows local users to cause a denial of service (system crash) via a crafted application.


5) Buffer overflow (CVE-ID: CVE-2011-3359)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame.


6) Input validation error (CVE-ID: CVE-2011-3363)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share.


7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2011-4080)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment.


8) Input validation error (CVE-ID: CVE-2011-2521)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The x86_assign_hw_event function in arch/x86/kernel/cpu/perf_event.c in the Performance Events subsystem in the Linux kernel before 2.6.39 does not properly calculate counter values, which allows local users to cause a denial of service (panic) via the perf program.


9) Input validation error (CVE-ID: CVE-2011-4611)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.


10) Resource management error (CVE-ID: CVE-2011-4326)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device.


11) NULL pointer dereference (CVE-ID: CVE-2011-3637)

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

The m_stop function in fs/proc/task_mmu.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error.


Remediation

Install update from vendor's website.

References