SB2013041303 - SUSE Linux update for Linux kernel



SB2013041303 - SUSE Linux update for Linux kernel

Published: April 13, 2013

Security Bulletin ID SB2013041303
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 17% Medium 33% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2012-4530)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The load_script function in fs/binfmt_script.c in the Linux kernel before 3.7.2 does not properly handle recursion, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.


2) Information disclosure (CVE-ID: CVE-2013-0160)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.


3) Input validation error (CVE-ID: CVE-2013-0216)

The vulnerability allows a remote #AU# to perform a denial of service (DoS) attack.

The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.


4) Buffer overflow (CVE-ID: CVE-2013-0231)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages

5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-0268)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.


6) Race condition (CVE-ID: CVE-2013-0871)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.


Remediation

Install update from vendor's website.