blob: d3ba6f7007f379252b392cd7b7ce7eff04494bc1 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
|
----------------------------------------------------------------------
Debian Security Advisory DSA-2906-1 security@debian.org
http://www.debian.org/security/ Dann Frazier
April 15, 2014 http://www.debian.org/security/faq
----------------------------------------------------------------------
Package : linux-2.6
Vulnerability : privilege escalation/denial of service/information leak
Problem type : local/remote
Debian-specific: no
CVE Id(s) : CVE-2013-0343 CVE-2013-2147 CVE-2013-2889 CVE-2013-2893
CVE-2013-4162 CVE-2013-4299 CVE-2013-4345 CVE-2013-4511
CVE-2013-4512 CVE-2013-4587 CVE-2013-6367 CVE-2013-6380
CVE-2013-6381 CVE-2013-6382 CVE-2013-6383 CVE-2013-7263
CVE-2013-7264 CVE-2013-7265 CVE-2013-7339 CVE-2014-0101
CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874
CVE-2014-2039 CVE-2014-2523 CVE-2103-2929
Several vulnerabilities have been discovered in the Linux kernel that may lead
to a denial of service, information leak or privilege escalation. The Common
Vulnerabilities and Exposures project identifies the following problems:
CVE-2013-0343
George Kargiotakis reported an issue in the temporary address handling
of the IPv6 privacy extensions. Users on the same LAN can cause a denial
of service or obtain access to sensitive information by sending router
advertisement messages that cause the temporary address generation to be
disabled.
CVE-2013-2147
Dan Carpenter reported issues in the cpqarray driver for Compaq
Smart2 Controllers and the cciss driver for HP Smart Array controllers
allowing users to gain access to sensitive kernel memory.
CVE-2013-2889
Kees Cook discovered that missing input sanitising in the HID
driver for Zeroplus game pads could lead to local denial of service.
CVE-2013-2893
Kees Cook discovered that missing input sanitising in the HID
driver for various Logitech force feedback devices could lead to local
denial of service.
CVE-2013-2929
Vasily Kulikov discovered that a flaw in the get_dumpable() function of
the ptrace subsytsem could lead to information disclosure.
'fs.suid_dumpable' needs to be set to 2.
CVE-2013-4162
Hannes Frederic Sowa discovered that incorrect handling of IPv6 sockets
using the UDP_CORK option could result in denial of service.
CVE-2013-4299
A bug in the device mapper can lead to information disclosure.
CVE-2013-4345
Stephan Mueller found in bug in the ANSI pseudo random number generator
which could lead to the use of less entropy than expected.
CVE-2013-4511
XXX PATCH IS MISSING CODE CHANGES TO au1[1,2]00fb.c - not sure this is
fixed.
CVE-2013-4512
Nico Golde and Fabian Yamaguchi reported an issue in the user mode
linux port. A buffer overflow condition exists in the write method
for the /proc/exitcode file. Local users with sufficient privilege
to write to this file could gain elevated privileges.
CVE-2013-4587
Andrew Honig of Google reported an issue in the KVM virtualization
subsystem. A local user could gain elevated privileges by passing
a large vcpu_id parameter.
CVE-2013-6367
Andrew Honig of Google reported an issue in the KVM virtualization
subsystem. A divide-by-zero condition could allow a guest user to
cause a denial of service on the host (crash).
CVE-2013-6380
Mahesh Rajashekhara reported an issue in the aacraid driver for storage
products from various vendors. Local users with CAP_SYS_ADMIN privileges
could gain further elevated privileges.
CVE-2013-6381
Nico Golde and Fabian Yamaguchi reported an issue in the Gigabit Ethernet
device support for s390 systems. Local users could cause a denial of
service or gain elevated privileges via the SIOC_QETH_ADP_SET_SNMP_CONTROL
ioctl.
CVE-2013-6382
Nico Golde and Fabian Yamaguchi reported an issue in the XFS filesystem.
Local users with CAP_SYS_ADMIN privileges could gain further elevated
privileges.
CVE-2013-6383
Dan Carpenter reported an issue in the aacraid driver for storage devices
from various vendors. A local user could gain elevated privileges due to
a missing privilege level check in the aac_compat_ioctl function.
CVE-2013-7263
CVE-2013-7264
CVE-2013-7265
mpb reported an information leak in the recvfrom, recvmmsg and recvmsg
system calls. A local user could obtain access to sensitive kernel memory.
CVE-2013-7339
Sasha Levin reported an issue in the RDS network protocol over Infiniband.
A local user could cause a denial of service condition.
CVE-2014-0101
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1874
CVE-2014-2039
CVE-2014-2523
For the oldstable distribution (squeeze), this problem has been fixed in
version 2.6.32-48squeeze5.
The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:
Debian 6.0 (squeeze)
user-mode-linux 2.6.32-1um-4+48squeeze5
We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
Note: Debian carefully tracks all known security issues across every
linux kernel package in all releases under active security support.
However, given the high frequency at which low-severity security
issues are discovered in the kernel and the resource requirements of
doing an update, updates for lower priority issues will normally not
be released for all kernels at the same time. Rather, they will be
released in a staggered or "leap-frog" fashion.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
|