CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:H/Au:S/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
61.5%
Andrew Cooper of Citrix reported a Xen stack corruption in the Linux
kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest
kernel to crash, or operate erroneously. (CVE-2013-0190)
A failure to validate input was discovered in the Linux kernel’s Xen
netback (network backend) driver. A user in a guest OS may exploit this
flaw to cause a denial of service to the guest OS and other guest domains.
(CVE-2013-0216)
A memory leak was discovered in the Linux kernel’s Xen netback (network
backend) driver. A user in a guest OS could trigger this flaw to cause a
denial of service on the system. (CVE-2013-0217)
A flaw was discovered in the Linux kernel Xen PCI backend driver. If a PCI
device is assigned to the guest OS, the guest OS could exploit this flaw to
cause a denial of service on the host. (CVE-2013-0231)
A flaw was reported in the permission checks done by the Linux kernel for
/dev/cpu/*/msr. A local root user with all capabilities dropped could
exploit this flaw to execute code with full root capabilities.
(CVE-2013-0268)
Tommi Rantala discovered a flaw in the a flaw the Linux kernels handling of
datagrams packets when the MSG_PEEK flag is specified. An unprivileged
local user could exploit this flaw to cause a denial of service (system
hang). (CVE-2013-0290)
A flaw was discovered in the Linux kernel’s vhost driver used to accelerate
guest networking in KVM based virtual machines. A privileged guest user
could exploit this flaw to crash the host system. (CVE-2013-0311)
A flaw was discovered in the Extended Verification Module (EVM) of the
Linux kernel. An unprivileged local user code exploit this flaw to cause a
denial of service (system crash). (CVE-2013-0313)
An information leak was discovered in the Linux kernel’s Bluetooth stack
when HIDP (Human Interface Device Protocol) support is enabled. A local
unprivileged user could exploit this flaw to cause an information leak from
the kernel. (CVE-2013-0349)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.10 | noarch | linux-image-3.5.0-221-omap4 | < 3.5.0-221.31 | UNKNOWN |
Ubuntu | 12.10 | noarch | block-modules-3.5.0-221-omap4-di | < 3.5.0-221.31 | UNKNOWN |
Ubuntu | 12.10 | noarch | crypto-modules-3.5.0-221-omap4-di | < 3.5.0-221.31 | UNKNOWN |
Ubuntu | 12.10 | noarch | fat-modules-3.5.0-221-omap4-di | < 3.5.0-221.31 | UNKNOWN |
Ubuntu | 12.10 | noarch | fs-core-modules-3.5.0-221-omap4-di | < 3.5.0-221.31 | UNKNOWN |
Ubuntu | 12.10 | noarch | fs-secondary-modules-3.5.0-221-omap4-di | < 3.5.0-221.31 | UNKNOWN |
Ubuntu | 12.10 | noarch | input-modules-3.5.0-221-omap4-di | < 3.5.0-221.31 | UNKNOWN |
Ubuntu | 12.10 | noarch | irda-modules-3.5.0-221-omap4-di | < 3.5.0-221.31 | UNKNOWN |
Ubuntu | 12.10 | noarch | kernel-image-3.5.0-221-omap4-di | < 3.5.0-221.31 | UNKNOWN |
Ubuntu | 12.10 | noarch | linux-headers-3.5.0-221 | < 3.5.0-221.31 | UNKNOWN |