SB2013061701 - SUSE Linux update for Linux kernel



SB2013061701 - SUSE Linux update for Linux kernel

Published: June 17, 2013

Security Bulletin ID SB2013061701
Severity
High
Patch available
YES
Number of vulnerabilities 14
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 7% Medium 86% Low 7%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 14 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2013-0160)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-1979)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.


3) Information disclosure (CVE-ID: CVE-2013-3076)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c.


4) Information disclosure (CVE-ID: CVE-2013-3222)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


5) Information disclosure (CVE-ID: CVE-2013-3223)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


6) Information disclosure (CVE-ID: CVE-2013-3224)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


7) Information disclosure (CVE-ID: CVE-2013-3225)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The rfcomm_sock_recvmsg function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


8) Information disclosure (CVE-ID: CVE-2013-3227)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


9) Information disclosure (CVE-ID: CVE-2013-3228)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


10) Information disclosure (CVE-ID: CVE-2013-3229)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


11) Information disclosure (CVE-ID: CVE-2013-3231)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


12) Information disclosure (CVE-ID: CVE-2013-3232)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


13) Information disclosure (CVE-ID: CVE-2013-3234)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


14) Information disclosure (CVE-ID: CVE-2013-3235)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.


Remediation

Install update from vendor's website.