![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.841476 |
Category: | Ubuntu Local Security Checks |
Title: | Ubuntu: Security Advisory (USN-1877-1) |
Summary: | The remote host is missing an update for the 'linux-ec2' package(s) announced via the USN-1877-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'linux-ec2' package(s) announced via the USN-1877-1 advisory. Vulnerability Insight: Andrew Honig reported a flaw in the way KVM (Kernel-based Virtual Machine) emulated the IOAPIC. A privileged guest user could exploit this flaw to read host memory or cause a denial of service (crash the host). (CVE-2013-1798) An information leak was discovered in the Linux kernel's rcvmsg path for ATM (Asynchronous Transfer Mode). A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory. (CVE-2013-3222) An information leak was discovered in the Linux kernel's recvmsg path for ax25 address family. A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory. (CVE-2013-3223) An information leak was discovered in the Linux kernel's recvmsg path for the bluetooth address family. A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory. (CVE-2013-3224) An information leak was discovered in the Linux kernel's bluetooth rfcomm protocol support. A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory. (CVE-2013-3225) An information leak was discovered in the Linux kernel's IRDA (infrared) support subsystem. A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory. (CVE-2013-3228) An information leak was discovered in the Linux kernel's s390 - z/VM support. A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory. (CVE-2013-3229) An information leak was discovered in the Linux kernel's llc (Logical Link Layer 2) support. A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory. (CVE-2013-3231) An information leak was discovered in the Linux kernel's receive message handling for the netrom address family. A local user could exploit this flaw to obtain sensitive information from the kernel's stack memory. (CVE-2013-3232) An information leak was discovered in the Linux kernel's Rose X.25 protocol layer. A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory. (CVE-2013-3234) An information leak was discovered in the Linux kernel's TIPC (Transparent Inter Process Communication) protocol implementation. A local user could exploit this flaw to examine potentially sensitive information from the kernel's stack memory. (CVE-2013-3235) Affected Software/OS: 'linux-ec2' package(s) on Ubuntu 10.04. Solution: Please install the updated package(s). CVSS Score: 6.2 CVSS Vector: AV:A/AC:H/Au:N/C:C/I:N/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-1798 MDVSA-2013:176 http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 RHSA-2013:0727 http://rhn.redhat.com/errata/RHSA-2013-0727.html RHSA-2013:0744 http://rhn.redhat.com/errata/RHSA-2013-0744.html RHSA-2013:0746 http://rhn.redhat.com/errata/RHSA-2013-0746.html RHSA-2013:0928 http://rhn.redhat.com/errata/RHSA-2013-0928.html RHSA-2013:1026 http://rhn.redhat.com/errata/RHSA-2013-1026.html USN-1809-1 http://www.ubuntu.com/usn/USN-1809-1 USN-1812-1 http://www.ubuntu.com/usn/USN-1812-1 USN-1813-1 http://www.ubuntu.com/usn/USN-1813-1 [oss-security] 20130320 linux kernel: kvm: CVE-2013-179[6..8] http://www.openwall.com/lists/oss-security/2013/03/20/9 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55 http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html https://bugzilla.redhat.com/show_bug.cgi?id=917017 https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55 openSUSE-SU-2013:0847 http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html openSUSE-SU-2013:0925 http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html openSUSE-SU-2013:1187 http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html Common Vulnerability Exposure (CVE) ID: CVE-2013-3222 http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103750.html http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104480.html https://lkml.org/lkml/2013/4/14/107 http://www.openwall.com/lists/oss-security/2013/04/14/3 RedHat Security Advisories: RHSA-2013:1051 http://rhn.redhat.com/errata/RHSA-2013-1051.html SuSE Security Announcement: SUSE-SU-2013:1182 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html SuSE Security Announcement: openSUSE-SU-2013:1187 (Google Search) SuSE Security Announcement: openSUSE-SU-2013:1971 (Google Search) http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://www.ubuntu.com/usn/USN-1837-1 Common Vulnerability Exposure (CVE) ID: CVE-2013-3223 Common Vulnerability Exposure (CVE) ID: CVE-2013-3224 Common Vulnerability Exposure (CVE) ID: CVE-2013-3225 Common Vulnerability Exposure (CVE) ID: CVE-2013-3228 Common Vulnerability Exposure (CVE) ID: CVE-2013-3229 Common Vulnerability Exposure (CVE) ID: CVE-2013-3231 RedHat Security Advisories: RHSA-2013:1645 http://rhn.redhat.com/errata/RHSA-2013-1645.html Common Vulnerability Exposure (CVE) ID: CVE-2013-3232 Common Vulnerability Exposure (CVE) ID: CVE-2013-3234 Common Vulnerability Exposure (CVE) ID: CVE-2013-3235 |
Copyright | Copyright (C) 2013 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |