LWN.net Logo

Mageia alert MGASA-2013-0082 (kernel-vserver)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0082: kernel-vserver-3.4.34-1.mga2 (2/core)
Date:  Sat, 2 Mar 2013 15:26:40 +0100
Message-ID:  <20130302142640.GA19791@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0082 Date: March 2nd, 2013 Affected releases: 2 Media: Core Description: This updates kernel-vserver to upstream stable 3.4.34. It also fixes the following security issues: An unprivileged user can send a netlink message resulting in an out-of-bounds access of the sock_diag_handlers[] array which, in turn, allows userland to take over control while in kernel mode. (CVE-2013-1763). Linux kernel is prone to a local privilege-escalation vulnerability due to a tmpfs use-after-free error. Local attackers can exploit the issue to execute arbitrary code with kernel privileges or to crash the kernel, effectively denying service to legitimate users (CVE-2013-1767). Linux kernel built with Edgeport USB serial converter driver io_ti, is vulnerable to a NULL pointer dereference flaw. It happens if the device is disconnected while corresponding /dev/ttyUSB? file is in use. An unprivileged user could use this flaw to crash the system, resulting DoS (CVE-2013-1774). Updated Packages: i586: kernel-vserver-3.4.34-1.mga2-1-1.mga2.i586.rpm kernel-vserver-devel-3.4.34-1.mga2-1-1.mga2.i586.rpm kernel-vserver-devel-latest-3.4.34-1.mga2.i586.rpm kernel-vserver-doc-3.4.34-1.mga2.noarch.rpm kernel-vserver-latest-3.4.34-1.mga2.i586.rpm kernel-vserver-source-3.4.34-1.mga2-1-1.mga2.noarch.rpm kernel-vserver-source-latest-3.4.34-1.mga2.noarch.rpm x86_64: kernel-vserver-3.4.34-1.mga2-1-1.mga2.x86_64.rpm kernel-vserver-devel-3.4.34-1.mga2-1-1.mga2.x86_64.rpm kernel-vserver-devel-latest-3.4.34-1.mga2.x86_64.rpm kernel-vserver-doc-3.4.34-1.mga2.noarch.rpm kernel-vserver-latest-3.4.34-1.mga2.x86_64.rpm kernel-vserver-source-3.4.34-1.mga2-1-1.mga2.noarch.rpm kernel-vserver-source-latest-3.4.34-1.mga2.noarch.rpm SRPMS: kernel-vserver-3.4.34-1.mga2.src.rpm References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1763 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1767 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.33 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.34 https://bugs.mageia.org/show_bug.cgi?id=9212 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds