LWN.net Logo

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2013-1935 CVE-2013-1943 CVE-2013-2017
Created:June 11, 2013 Updated:June 13, 2013
Description: From the Red Hat advisory:

* A flaw was found in the way KVM (Kernel-based Virtual Machine) initialized a guest's registered pv_eoi (paravirtualized end-of-interrupt) indication flag when entering the guest. An unprivileged guest user could potentially use this flaw to crash the host. (CVE-2013-1935, Important)

* A missing sanity check was found in the kvm_set_memory_region() function in KVM, allowing a user-space process to register memory regions pointing to the kernel address space. A local, unprivileged user could use this flaw to escalate their privileges. (CVE-2013-1943, Important)

* A double free flaw was found in the Linux kernel's Virtual Ethernet Tunnel driver (veth). A remote attacker could possibly use this flaw to crash a target system. (CVE-2013-2017, Moderate)

Red Hat would like to thank IBM for reporting the CVE-2013-1935 issue and Atzm WATANABE of Stratosphere Inc. for reporting the CVE-2013-2017 issue. The CVE-2013-1943 issue was discovered by Michael S. Tsirkin of Red Hat.

Alerts:
Red Hat RHSA-2013:0911-01 2013-06-10
Oracle ELSA-2013-0911 2013-06-11
CentOS CESA-2013:0911 2013-06-12
Oracle ELSA-2013-2534 2013-06-12
Oracle ELSA-2013-2534 2013-06-12
Scientific Linux SL-kern-20130612 2013-06-12
Ubuntu USN-1940-1 2013-09-06
Ubuntu USN-1939-1 2013-09-06

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds