- Home
- CVEs with nessus.description==Updated+kernel+packages+that+fix+multiple+security+issues+and+one+bug+are+now+available+for+Red+Hat+Enterprise+Linux+5.%0A%0AThe+Red+Hat+Security+Response+Team+has+rated+this+update+as+having+moderate+security+impact.+Common+Vulnerability+Scoring+System+%28CVSS%29+base+scores%2C+which+give+detailed+severity+ratings%2C+are+available+for+each+vulnerability+from+the+CVE+links+in+the+References+section.%0A%0AThe+kernel+packages+contain+the+Linux+kernel%2C+the+core+of+any+Linux+operating+system.%0A%0A%2A+A+flaw+was+found+in+the+way+the+Linux+kernel+handled+the+creation+of+temporary+IPv6+addresses.+If+the+IPv6+privacy+extension+was+enabled+%28%2Fproc%2Fsys%2Fnet%2Fipv6%2Fconf%2Feth0%2Fuse_tempaddr+is+set+to+%272%27%29%2C+an+attacker+on+the+local+network+could+disable+IPv6+temporary+address+generation%2C+leading+to+a+potential+information+disclosure.+%28CVE-2013-0343%2C+Moderate%29%0A%0A%2A+An+information+leak+flaw+was+found+in+the+way+Linux+kernel%27s+device+mapper+subsystem%2C+under+certain+conditions%2C+interpreted+data+written+to+snapshot+block+devices.+An+attacker+could+use+this+flaw+to+read+data+from+disk+blocks+in+free+space%2C+which+are+normally+inaccessible.%0A%28CVE-2013-4299%2C+Moderate%29%0A%0A%2A+An+off-by-one+flaw+was+found+in+the+way+the+ANSI+CPRNG+implementation+in+the+Linux+kernel+processed+non-block+size+aligned+requests.+This+could+lead+to+random+numbers+being+generated+with+less+bits+of+entropy+than+expected+when+ANSI+CPRNG+was+used.%0A%28CVE-2013-4345%2C+Moderate%29%0A%0A%2A+An+information+leak+flaw+was+found+in+the+way+Xen+hypervisor+emulated+the+OUTS+instruction+for+64-bit+paravirtualized+guests.+A+privileged+guest+user+could+use+this+flaw+to+leak+hypervisor+stack+memory+to+the+guest.+%28CVE-2013-4368%2C+Moderate%29%0A%0ARed+Hat+would+like+to+thank+Fujitsu+for+reporting+CVE-2013-4299%2C+Stephan+Mueller+for+reporting+CVE-2013-4345%2C+and+the+Xen+project+for+reporting+CVE-2013-4368.%0A%0AThis+update+also+fixes+the+following+bug+%3A%0A%0A%2A+A+bug+in+the+GFS2+code+prevented+glock+work+queues+from+freeing+glock-related+memory+while+the+glock+memory+shrinker+repeatedly+queued+a+large+number+of+demote+requests%2C+for+example+when+performing+a+simultaneous+backup+of+several+live+GFS2+volumes+with+a+large+file+count.+As+a+consequence%2C+the+glock+work+queues+became+overloaded+which+resulted+in+a+high+CPU+usage+and+the+GFS2+file+systems+being+unresponsive+for+a+significant+amount+of+time.+A+patch+has+been+applied+to+alleviate+this+problem+by+calling+the+yield%28%29+function+after+scheduling+a+certain+amount+of+tasks+on+the+glock+work+queues.%0AThe+problem+can+now+occur+only+with+extremely+high+work+loads.%0A%28BZ%231014714%29%0A%0AAll+kernel+users+are+advised+to+upgrade+to+these+updated+packages%2C+which+contain+backported+patches+to+correct+these+issues.+The+system+must+be+rebooted+for+this+update+to+take+effect
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top