LWN.net Logo

Advertisement

Free copy of The Founder's Checklist and The Founders Pitch Deck Template from M L Bittle - New York; Advisor/Coach.

Advertise here

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2013-1828 CVE-2013-1792 CVE-2013-1825
Created:March 11, 2013 Updated:March 22, 2013
Description: From the Red Hat bugzilla [1], [2], [3]:

A local user could use the missing size check in sctp_getsockopt_assoc_stats() function to escalate their privileges. On x86 this might be mitigated by destination object size check as the destination size is known at compile time.

A race condition leading to a NULL pointer dereference is discovered in the Linux kernel. It occurs during parallel invocation of install_user_keyrings & lookup_user_key routines.

Linux kernels built with crypto user APIs are vulnerable to the information disclosure flaw. It occurs when user calls the `crypto_*_report' APIs via netlink based crypto API interface.

A privileged user/program (CAP_NET_ADMIN) could use this flaw to read kernel memory area.

Alerts:
Fedora FEDORA-2013-3630 2013-03-11
Fedora FEDORA-2013-3909 2013-03-22
Ubuntu USN-1787-1 2013-04-02
Ubuntu USN-1788-1 2013-04-03

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds