SuSE: 2013:0674-1: important: Linux kernel
Summary
This Linux kernel update fixes various security issues and bugs in the SUSE Linux Enterprise 10 SP4 kernel. The following security issues have been fixed: * CVE-2013-0871: A race condition in ptrace(2) could be used by local attackers to crash the kernel and/or execute code in kernel context. * CVE-2013-0160: Avoid side channel information leaks from the ptys via ptmx, which allowed local attackers to guess keypresses. * CVE-2012-4530: Avoid leaving bprm->interp on the stack which might have leaked information from the kernel to userland attackers. * CVE-2013-0268: The msr_open function in arch/x86/kernel/msr.c in the Linux kernel allowed local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c. * CVE-2013-0216: The Xen netback functionality in the Linux kernel allowed guest OS users to cause a denial of service (loop) by t...
Read the Full AdvisoryReferences
#742111 #765687 #769093 #770980 #776370 #781485
#785101 #786013 #787272 #789012 #790236 #792697
#795075 #795335 #797175 #799611 #800280 #801178
#802642 #804154 #809692
Cross- CVE-2012-4530 CVE-2013-0160 CVE-2013-0216
CVE-2013-0231 CVE-2013-0268 CVE-2013-0871
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
https://www.suse.com/security/cve/CVE-2012-4530.html
https://www.suse.com/security/cve/CVE-2013-0160.html
https://www.suse.com/security/cve/CVE-2013-0216.html
https://www.suse.com/security/cve/CVE-2013-0231.html
https://www.suse.com/security/cve/CVE-2013-0268.html
https://www.suse.com/security/cve/CVE-2013-0871.html
https://bugzilla.novell.com/742111
https://bugzilla.novell.com/765687
https://bugzilla.novell.com/769093
https://bugzilla.novell...
Read the Full Advisory