Model wearing plain white basic tee.

CentOS Update for kernel CESA-2013:0594 centos5

Information

Severity

Severity

High

Family

Family

CentOS Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.6

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:H/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

9 years ago

Modified

Modified

3 years ago

Summary

The remote host is missing an update for the 'kernel' package(s) announced via the referenced advisory.

Insight

Insight

The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issues: * Buffer overflow flaws were found in the udf_load_logicalvol() function in the Universal Disk Format (UDF) file system implementation in the Linux kernel. An attacker with physical access to a system could use these flaws to cause a denial of service or escalate their privileges. (CVE-2012-3400, Low) This update also fixes the following bugs: * Previously, race conditions could sometimes occur in interrupt handling on the Emulex BladeEngine 2 (BE2) controllers, causing the network adapter to become unresponsive. This update provides a series of patches for the be2net driver, which prevents the race from occurring. The network cards using BE2 chipsets no longer hang due to incorrectly handled interrupt events. (BZ#884704) * A boot-time memory allocation pool (the DMI heap) is used to keep the list of Desktop Management Interface (DMI) devices during the system boot. Previously, the size of the DMI heap was only 2048 bytes on the AMD64 and Intel 64 architectures and the DMI heap space could become easily depleted on some systems, such as the IBM System x3500 M2. A subsequent OOM failure could, under certain circumstances, lead to a NULL pointer entry being stored in the DMI device list. Consequently, scanning of such a corrupted DMI device list resulted in a kernel panic. The boot-time memory allocation pool for the AMD64 and Intel 64 architectures has been enlarged to 4096 bytes and the routines responsible for populating the DMI device list have been modified to skip entries if their name string is NULL. The kernel no longer panics in this scenario. (BZ#902683) * The size of the buffer used to print the kernel taint output on kernel panic was too small, which resulted in the kernel taint output not being printed completely sometimes. With this update, the size of the buffer has been adjusted and the kernel taint output is now displayed properly. (BZ#905829) * The code to print the kernel taint output contained a typographical error. Consequently, the kernel taint output, which is displayed on kernel panic, could not provide taint error messages for unsupported hardware. This update fixes the typo and the kernel taint output is now displayed correctly. (BZ#885063) Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.

Affected Software

Affected Software

kernel on CentOS 5

Solution

Solution

Please install the updated packages.

Common Vulnerabilities and Exposures (CVE)

How Mageni can help you?

How Mageni can help you?

Mageni can help you to know and remediate your vulnerabilities reducing your risk exposure and minimizing the likelihood of a data breach while decreasing your spending.

60% of breach victims were breached due to an unpatched known vulnerability1

62% were unaware that they were vulnerable prior to the data breach1

$4.24 million cost per data breach on average; highest in 17-year report history2

Citations 1. Costs and Consequences of Gaps in Vulnerability Response, Ponemom Institute 2. Cost of a Data Breach Report 2021, IBM

Mageni makes easy to find, prioritize, and remediate the vulnerabilities

Supported by industry-leading vulnerability intelligence and CompTIA PenTest+ professionals, Mageni puts security expertise in your hands.

Internal and External Scans

Scan your internal and public assets for vulnerabilities.

Remediate

Get the recommendations to mitigate the risks and vulnerabilities.

Secure your Applications

Scan third-party applications like Java, Chrome, Adobe and more.

Comprehensive Coverage

Scan servers, workstations and network devices for vulnerabilities.

Report and Analyze

Receive a report of the vulnerabilities that affect your assets.

More visibility

Perform non-credentialed or credentialed scans.

Prioritize

Prioritize the vulnerabilities based on CVSS, severity and other variables.

SSL Certificates

Improve the security of your secure layer and certificates.

Simple and transparent pricing

Get started for free with 7 days trial plus Money-Back Guarantee for 7 days after the end of the trial

Stop worrying about your budget or licenses limits

Mageni provides unlimited vulnerability scans for unlimited assets at a fixed price so you don't have to worry anymore about your budget or license limits.

What's included

  • Unlimited vulnerability scans for unlimited assets

  • Support by Certified CompTIA PenTest+ Professional

  • Access to Support Portal

  • Email Support Monday through Friday 9AM-5PM EST

  • Vulnerability Database Updates

  • Software Maintenance with Patches and Bug Fixes

  • Unlimited Support Cases

  • Software Updates and Upgrades

Why should I get a subscription now?

Enjoy the peace of mind and confidence that comes from having Mageni working for you.

For the Earth

Like you, we love the planet, that's why Mageni is a Stripe Climate member and 1% of your subscription goes to carbon removal.

Start for Free plus Money-back Guarantee

Get started for free with 7 days trial plus your eligible for a full reimbursement within 7 calendar days of the end of your trial. You don't need a reason to request a refund and we won't ask you a question.

Talk to a CompTIA Pentest+ when you need

CompTIA PenTest+ is the certification for cybersecurity professionals tasked with penetration testing and vulnerability management. CompTIA Pentest+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Payments Processed By Stripe

For your security all subscriptions made through this website (mageni.net) are processed by Stripe (stripe.com). Stripe has been audited by an independent PCI Qualified Security Assessor (QSA) and is certified as a PCI Level 1 Service Provider. This is the most stringent level of certification available in the payments industry.

Frequently asked questions

Can’t find the answer? Send an email to help@mageni.net

Do you offer a free plan?
No, and the reason is that to provide you a great service Mageni have invested heavily in people, process and technology. The personal developing the product and providing support is CompTIA PenTest+ certified. The infrastructure uses Amazon AWS datacenters which are state of the art. So the subscription is priced at only $4 USD per month to provide you a great service at the most affordable price.
Can I install Mageni in Windows, macOS and Linux?
Yes, please read the documentation for details.
Can I get a refund?
Yes, contact us within the first 7 days after the end of the trial and we'll send you the refund. No questions asked
Who process my credit card information?
Stripe a PCI DSS Certified payment platform
Can I cancel the subscription?
Yes, please feel free to cancel your subscription at anytime
Can I pause the subscription?
Yes, please feel free to pause your subscription at anytime. While is paused it won't generate charges but you won't receive updates.
Can I delete my account?
Yes, please feel free to do so at anytime, just make sure that prior to that you cancel your subscription
What are support hours?
Monday to Friday from 9AM to 5PM EST (New York)
Can I verify the CompTIA Pentest+ Certification?
Yes, please contact us
Is this subscription a contract?
No, you can cancel it at anytime that you wish.
How can I open a support ticket?
Please visit the support portal
Is the license limited per installation?
If you are a MSP (Managed Service Provider) or a Security Company, yes, the license is limited and please contact us for pricing. If you are an organization who whishes to install it on many branches the license is not limited and you can use the same license to install Mageni in your branches.

Ready to get started? Start you 7-day free trial