[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2632-1 linux-2.6 -- privilege escalation/denial of service

ID: oval:org.secpod.oval:def:600975Date: (C)2013-02-28   (M)2024-02-19
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-0231 Jan Beulich provided a fix for an issue in the Xen PCI backend drivers. Users of guests on a system using passed-through PCI devices can create a denial of service of the host system due to the use of non-ratelimited kernel log messages. CVE-2013-0871 Suleiman Souhlal and Salman Qazi of Google, with help from Aaron Durbin and Michael Davidson of Google, discovered an issue in the ptrace subsystem. Due to a race condition with PTRACE_SETREGS, local users can cause kernel stack corruption and execution of arbitrary code.

Platform:
Debian 6.0
Product:
user-mode-linux
Reference:
DSA-2632-1
CVE-2013-0231
CVE-2013-0871
CVE    2
CVE-2013-0871
CVE-2013-0231
CPE    2
cpe:/a:user-mode_linux:user-mode-linux
cpe:/o:debian:debian_linux:6.0

© SecPod Technologies