SB2013041303 - SUSE Linux update for Linux kernel
Published: April 13, 2013
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2012-4530)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The load_script function in fs/binfmt_script.c in the Linux kernel before 3.7.2 does not properly handle recursion, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
2) Information disclosure (CVE-ID: CVE-2013-0160)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
3) Input validation error (CVE-ID: CVE-2013-0216)
The vulnerability allows a remote #AU# to perform a denial of service (DoS) attack.
The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.
4) Buffer overflow (CVE-ID: CVE-2013-0231)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-0268)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.
6) Race condition (CVE-ID: CVE-2013-0871)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.
Remediation
Install update from vendor's website.