SCIENTIFIC-LINUX-ERRATA Archives

April 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Wed, 24 Apr 2013 14:05:06 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (128 lines)
Synopsis:          Important: kernel security and bug fix update
Advisory ID:       SLSA-2013:0744-1
Issue Date:        2013-04-23
CVE Numbers:       CVE-2013-0349
                   CVE-2013-1767
                   CVE-2013-1773
                   CVE-2013-1774
                   CVE-2013-1792
                   CVE-2013-1796
                   CVE-2013-1797
                   CVE-2013-1798
                   CVE-2013-1827
                   CVE-2013-1826
                   CVE-2013-0913
                   CVE-2012-6547
                   CVE-2012-6546
                   CVE-2012-6537
--

* An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way the Intel i915 driver in the Linux kernel handled the
allocation of the buffer used for relocation copies. A local user with
console access could use this flaw to cause a denial of service or
escalate their privileges. (CVE-2013-0913, Important)

* A buffer overflow flaw was found in the way UTF-8 characters were
converted to UTF-16 in the utf8s_to_utf16s() function of the Linux
kernel's FAT file system implementation. A local user able to mount a FAT
file system with the "utf8=1" option could use this flaw to crash the
system or, potentially, to escalate their privileges. (CVE-2013-1773,
Important)

* A flaw was found in the way KVM handled guest time updates when the
buffer the guest registered by writing to the MSR_KVM_SYSTEM_TIME machine
state register (MSR) crossed a page boundary. A privileged guest user
could use this flaw to crash the host or, potentially, escalate their
privileges, allowing them to execute arbitrary code at the host kernel
level. (CVE-2013-1796, Important)

* A potential use-after-free flaw was found in the way KVM handled guest
time updates when the GPA (guest physical address) the guest registered by
writing to the MSR_KVM_SYSTEM_TIME machine state register (MSR) fell into
a movable or removable memory region of the hosting user-space process (by
default, QEMU-KVM) on the host. If that memory region is deregistered from
KVM using KVM_SET_USER_MEMORY_REGION and the allocated virtual memory
reused, a privileged guest user could potentially use this flaw to
escalate their privileges on the host. (CVE-2013-1797, Important)

* A flaw was found in the way KVM emulated IOAPIC (I/O Advanced
Programmable Interrupt Controller). A missing validation check in the
ioapic_read_indirect() function could allow a privileged guest user to
crash the host, or read a substantial portion of host kernel memory.
(CVE-2013-1798, Important)

* A race condition in install_user_keyrings(), leading to a NULL pointer
dereference, was found in the key management facility. A local,
unprivileged user could use this flaw to cause a denial of service.
(CVE-2013-1792, Moderate)

* A NULL pointer dereference in the XFRM implementation could allow a
local user who has the CAP_NET_ADMIN capability to cause a denial of
service. (CVE-2013-1826, Moderate)

* A NULL pointer dereference in the Datagram Congestion Control Protocol
(DCCP) implementation could allow a local user to cause a denial of
service. (CVE-2013-1827, Moderate)

* Information leak flaws in the XFRM implementation could allow a local
user who has the CAP_NET_ADMIN capability to leak kernel stack memory to
user-space. (CVE-2012-6537, Low)

* Two information leak flaws in the Asynchronous Transfer Mode (ATM)
subsystem could allow a local, unprivileged user to leak kernel stack
memory to user-space. (CVE-2012-6546, Low)

* An information leak was found in the TUN/TAP device driver in the
networking implementation. A local user with access to a TUN/TAP virtual
interface could use this flaw to leak kernel stack memory to user-space.
(CVE-2012-6547, Low)

* An information leak in the Bluetooth implementation could allow a local
user who has the CAP_NET_ADMIN capability to leak kernel stack memory to
user-space. (CVE-2013-0349, Low)

* A use-after-free flaw was found in the tmpfs implementation. A local
user able to mount and unmount a tmpfs file system could use this flaw to
cause a denial of service or, potentially, escalate their privileges.
(CVE-2013-1767, Low)

* A NULL pointer dereference was found in the Linux kernel's USB Inside
Out Edgeport Serial Driver implementation. An attacker with physical
access to a system could use this flaw to cause a denial of service.
(CVE-2013-1774, Low)
--

SL6
  x86_64
    kernel-2.6.32-358.6.1.el6.x86_64.rpm
    kernel-debug-2.6.32-358.6.1.el6.x86_64.rpm
    kernel-debug-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm
    kernel-debug-devel-2.6.32-358.6.1.el6.x86_64.rpm
    kernel-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm
    kernel-debuginfo-common-x86_64-2.6.32-358.6.1.el6.x86_64.rpm
    kernel-devel-2.6.32-358.6.1.el6.x86_64.rpm
    kernel-headers-2.6.32-358.6.1.el6.x86_64.rpm
    perf-2.6.32-358.6.1.el6.x86_64.rpm
    perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm
    python-perf-debuginfo-2.6.32-358.6.1.el6.x86_64.rpm
    python-perf-2.6.32-358.6.1.el6.x86_64.rpm
  i386
    kernel-2.6.32-358.6.1.el6.i686.rpm
    kernel-debug-2.6.32-358.6.1.el6.i686.rpm
    kernel-debug-debuginfo-2.6.32-358.6.1.el6.i686.rpm
    kernel-debug-devel-2.6.32-358.6.1.el6.i686.rpm
    kernel-debuginfo-2.6.32-358.6.1.el6.i686.rpm
    kernel-debuginfo-common-i686-2.6.32-358.6.1.el6.i686.rpm
    kernel-devel-2.6.32-358.6.1.el6.i686.rpm
    kernel-headers-2.6.32-358.6.1.el6.i686.rpm
    perf-2.6.32-358.6.1.el6.i686.rpm
    perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm
    python-perf-debuginfo-2.6.32-358.6.1.el6.i686.rpm
    python-perf-2.6.32-358.6.1.el6.i686.rpm
  noarch
    kernel-doc-2.6.32-358.6.1.el6.noarch.rpm
    kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2