[USN-1808-1] Linux kernel (EC2) vulnerabilities
Several security issues were fixed in the kernel.
Mathias Krause discovered an information leak in the Linux kernel's
getsockname implementation for Logical Link Layer (llc) sockets. A local
user could exploit this flaw to examine some of the kernel's stack memory.
(CVE-2012-6542)
Mathias Krause discovered information leaks in the Linux kernel's Bluetooth
Logical Link Control and Adaptation Protocol (L2CAP) implementation. A
local user could exploit these flaws to examine some of the kernel's stack
memory. (CVE-2012-6544)
Mathias Krause discovered information leaks in the Linux kernel's Bluetooth
RFCOMM protocol implementation. A local user could exploit these flaws to
examine parts of kernel memory. (CVE-2012-6545)
Mathias Krause discovered information leaks in the Linux kernel's
Asynchronous Transfer Mode (ATM) networking stack. A local user could
exploit these flaws to examine some parts of kernel memory. (CVE-2012-6546)
Mathias Krause discovered an information leak in the Linux kernel's UDF
file system implementation. A local user could exploit this flaw to examine
some of the kernel's heap memory. (CVE-2012-6548)
Andrew Jones discovered a flaw with the xen_iret function in Linux kernel's
Xen virtualizeation. In the 32-bit Xen paravirt platform an unprivileged
guest OS user could exploit this flaw to cause a denial of service (crash
the system) or gain guest OS privilege. (CVE-2013-0228)
An information leak was discovered in the Linux kernel's Bluetooth stack
when HIDP (Human Interface Device Protocol) support is enabled. A local
unprivileged user could exploit this flaw to cause an information leak from
the kernel. (CVE-2013-0349)
A flaw was discovered in the Edgeort USB serial converter driver when the
device is disconnected while it is in use. A local user could exploit this
flaw to cause a denial of service (system crash). (CVE-2013-1774)
Andrew Honig discovered a flaw in guest OS time updates in the Linux
kernel's KVM (Kernel-based Virtual Machine). A privileged guest user could
exploit this flaw to cause a denial of service (crash host system) or
potential escalate privilege to the host kernel level. (CVE-2013-1796)
- ID
- USN-1808-1
- Severity
- medium
- Severity from
- CVE-2013-1796
- URL
- https://ubuntu.com/security/notices/USN-1808-1
- Published
-
2013-04-25T07:52:31
(11 years ago) - Modified
-
2013-04-25T07:52:31
(11 years ago) - Other Advisories
-
- ALAS-2013-200
- ALAS-2013-218
- DSA-2669-1
- ELSA-2013-0630
- ELSA-2013-0727
- ELSA-2013-0744
- ELSA-2013-0747
- ELSA-2013-1034
- ELSA-2013-1051
- ELSA-2013-1173
- ELSA-2013-1645
- ELSA-2013-2507
- ELSA-2013-2519
- ELSA-2013-2520
- ELSA-2013-2525
- ELSA-2013-2534
- ELSA-2013-2537
- ELSA-2013-2538
- ELSA-2013-2542
- ELSA-2013-2543
- ELSA-2013-2584
- ELSA-2013-2585
- FEDORA-2013-10695
- FEDORA-2013-12530
- FEDORA-2013-12990
- FEDORA-2013-13536
- FEDORA-2013-15151
- FEDORA-2013-16336
- FEDORA-2013-17010
- FEDORA-2013-17942
- FEDORA-2013-18364
- FEDORA-2013-18822
- FEDORA-2013-20748
- FEDORA-2013-21822
- FEDORA-2013-22695
- FEDORA-2013-2597
- FEDORA-2013-2635
- FEDORA-2013-2728
- FEDORA-2013-3086
- FEDORA-2013-3106
- FEDORA-2013-3223
- FEDORA-2013-3630
- FEDORA-2013-3893
- FEDORA-2013-3909
- FEDORA-2013-4012
- FEDORA-2013-4240
- FEDORA-2013-4357
- FEDORA-2013-5368
- FEDORA-2013-6041
- FEDORA-2013-6537
- FEDORA-2013-6999
- FEDORA-2013-9123
- RHSA-2013:0630
- RHSA-2013:0744
- RHSA-2013:1051
- RHSA-2013:1173
- RHSA-2013:1645
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0652-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- USN-1599-1
- USN-1610-1
- USN-1648-1
- USN-1649-1
- USN-1652-1
- USN-1743-1
- USN-1744-1
- USN-1745-1
- USN-1756-1
- USN-1760-1
- USN-1767-1
- USN-1768-1
- USN-1769-1
- USN-1774-1
- USN-1778-1
- USN-1781-1
- USN-1795-1
- USN-1796-1
- USN-1797-1
- USN-1805-1
- USN-1809-1
- USN-1811-1
- USN-1812-1
- USN-1813-1
- USN-1814-1
- XSA-42
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |