The Linux kernel was updated to fix various bugs and security issues:
CVE-2013-0871: Race condition in the ptrace functionality in the Linux
kernel allowed local users to gain privileges via a PTRACE_SETREGS ptrace
system call in a crafted application, as demonstrated by ptrace_death.
CVE-2013-0160: Avoid a side channel attack on /dev/ptmx (keyboard input
timing).
CVE-2012-5374: Fixed a local denial of service in the BTRFS hashing code.
CVE-2013-0309: arch/x86/include/asm/pgtable.h in the Linux kernel, when
transparent huge pages are used, does not properly support PROT_NONE
memory regions, which allows local users to cause a denial of service
(system crash) via a crafted application.
CVE-2013-0268: The msr_open function in arch/x86/kernel/msr.c in the Linux
kernel allowed local users to bypass intended capability restrictions
by executing a crafted application as root, as demonstrated by msr32.c.
CVE-2012-0957: The override_release function in kernel/sys.c in the
Linux kernel allowed local users to obtain sensitive information from
kernel stack memory via a uname system call in conjunction with a
UNAME26 personality.
CVE-2013-0216: The Xen netback functionality in the Linux kernel allowed
guest OS users to cause a denial of service (loop) by triggering ring
pointer corruption.
CVE-2013-0231: The pciback_enable_msi function in the PCI backend driver
(drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux
kernel allowed guest OS users with PCI device access to cause a denial
of service via a large number of kernel log messages. NOTE: some of
these details are obtained from third party information.
CVE-2012-4530: The load_script function in fs/binfmt_script.c in the
Linux kernel did not properly handle recursion, which allowed local
users to obtain sensitive information from kernel stack memory via a
crafted application.
CVE-2012-4508: Race condition in fs/ext4/extents.c in the Linux kernel
allowed local users to obtain sensitive information from a deleted file
by reading an extent that was not properly marked as uninitialized.
CVE-2012-3412: The sfc (aka Solarflare Solarstorm) driver in the Linux
kernel allowed remote attackers to cause a denial of service (DMA
descriptor consumption and network-controller outage) via crafted TCP
packets that trigger a small MSS value.
CVE-2012-2745: The copy_creds function in kernel/cred.c in the Linux
kernel provided an invalid replacement session keyring to a child process,
which allowed local users to cause a denial of service (panic) via a
crafted application that uses the fork system call.
CVE-2012-3375: The epoll_ctl system call in fs/eventpoll.c in the Linux
kernel did not properly handle ELOOP errors in EPOLL_CTL_ADD operations,
which allowed local users to cause a denial of service (file-descriptor
consumption and system crash) via a crafted application that attempts
to create a circular epoll dependency.
CVE-2012-3400: Heap-based buffer overflow in the udf_load_logicalvol
function in fs/udf/super.c in the Linux kernel allowed remote attackers
to cause a denial of service (system crash) or possibly have unspecified
other impact via a crafted UDF filesystem.
- Submitted by Jeff Mahoney (jeff_mahoney)
- Reboot is suggested