[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

openSUSE-SU-2013:0847-1 -- Suse kernel

ID: oval:org.secpod.oval:def:400534Date: (C)2013-06-04   (M)2024-03-07
Class: PATCHFamily: unix




The openSUSE 12.1 kernel was updated to fix a severe secrutiy issue and various bugs. Security issues fixed: CVE-2013-2094: The perf_swevent_init function in kernel/events/core.c in the Linux kernel used an incorrect integer data type, which allowed local users to gain privileges via a crafted perf_event_open system call. CVE-2013-1774: The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to cause a denial of service via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter. CVE-2013-1928: The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel lacked a certain error check, which might have allowed local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device. CVE-2013-1796: The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel did not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allowed guest OS users to cause a denial of service or possibly have unspecified other impact via a crafted application. CVE-2013-1797: Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel allowed guest OS users to cause a denial of service or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address in movable or removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation. CVE-2013-1798: The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel did not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allowed guest OS users to obtain sensitive information from host OS memory or cause a denial of service via a crafted application. CVE-2013-1767: Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel allowed local users to gain privileges or cause a denial of service by remounting a tmpfs filesystem without specifying a required mpol mount option. CVE-2013-0913: Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager subsystem in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition. Bugs fixed: - qlge: fix dma map leak when the last chunk is not allocated . - TTY: fix atime/mtime regression . - fs/compat_ioctl.c: VIDEO_SET_SPU_PALETTE missing error check . - USB: io_ti: Fix NULL dereference in chase_port . - KVM: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache_init . - KVM: Fix bounds checking in ioapic indirect register read . - KVM: Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME . - kabi/severities: Allow kvm module abi changes - modules are self consistent - loopdev: fix a deadlock . - block: use i_size_write in bd_set_size . - drm/i915: bounds check execbuffer relocation count . - tmpfs: fix use-after-free of mempolicy object .

Platform:
openSUSE 12.1
Product:
kernel
Reference:
openSUSE-SU-2013:0847-1
CVE-2013-0913
CVE-2013-1767
CVE-2013-1774
CVE-2013-1796
CVE-2013-1797
CVE-2013-1798
CVE-2013-2094
CVE-2013-1928
CVE    8
CVE-2013-1774
CVE-2013-2094
CVE-2013-0913
CVE-2013-1796
...
CPE    1
cpe:/o:opensuse:opensuse:12.1

© SecPod Technologies