Linux kernel (EC2) vulnerabilities

2013-06-14T00:00:00
ID USN-1877-1
Type ubuntu
Reporter Ubuntu
Modified 2013-06-14T00:00:00

Description

Andrew Honig reported a flaw in the way KVM (Kernel-based Virtual Machine) emulated the IOAPIC. A privileged guest user could exploit this flaw to read host memory or cause a denial of service (crash the host). (CVE-2013-1798)

An information leak was discovered in the Linux kernel’s rcvmsg path for ATM (Asynchronous Transfer Mode). A local user could exploit this flaw to examine potentially sensitive information from the kernel’s stack memory. (CVE-2013-3222)

An information leak was discovered in the Linux kernel’s recvmsg path for ax25 address family. A local user could exploit this flaw to examine potentially sensitive information from the kernel’s stack memory. (CVE-2013-3223)

An information leak was discovered in the Linux kernel’s recvmsg path for the bluetooth address family. A local user could exploit this flaw to examine potentially sensitive information from the kernel’s stack memory. (CVE-2013-3224)

An information leak was discovered in the Linux kernel’s bluetooth rfcomm protocol support. A local user could exploit this flaw to examine potentially sensitive information from the kernel’s stack memory. (CVE-2013-3225)

An information leak was discovered in the Linux kernel’s IRDA (infrared) support subsystem. A local user could exploit this flaw to examine potentially sensitive information from the kernel’s stack memory. (CVE-2013-3228)

An information leak was discovered in the Linux kernel’s s390 - z/VM support. A local user could exploit this flaw to examine potentially sensitive information from the kernel’s stack memory. (CVE-2013-3229)

An information leak was discovered in the Linux kernel’s llc (Logical Link Layer 2) support. A local user could exploit this flaw to examine potentially sensitive information from the kernel’s stack memory. (CVE-2013-3231)

An information leak was discovered in the Linux kernel’s receive message handling for the netrom address family. A local user could exploit this flaw to obtain sensitive information from the kernel’s stack memory. (CVE-2013-3232)

An information leak was discovered in the Linux kernel’s Rose X.25 protocol layer. A local user could exploit this flaw to examine potentially sensitive information from the kernel’s stack memory. (CVE-2013-3234)

An information leak was discovered in the Linux kernel’s TIPC (Transparent Inter Process Communication) protocol implementation. A local user could exploit this flaw to examine potentially sensitive information from the kernel’s stack memory. (CVE-2013-3235)