First published: Tue Apr 02 2013(Updated: )
Emese Revfy discovered that in the Linux kernel signal handlers could leak address information across an exec, making it possible to by pass ASLR (Address Space Layout Randomization). A local user could use this flaw to by pass ASLR to reliably deliver an exploit payload that would otherwise be stopped (by ASLR). (CVE-2013-0914) A memory use after free error was discover in the Linux kernel's tmpfs filesystem. A local user could exploit this flaw to gain privileges or cause a denial of service (system crash). (CVE-2013-1767) Mateusz Guzik discovered a race in the Linux kernel's keyring. A local user could exploit this flaw to cause a denial of service (system crash). (CVE-2013-1792)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.0.0-32-powerpc64-smp | <3.0.0-32.51 | 3.0.0-32.51 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-32-omap | <3.0.0-32.51 | 3.0.0-32.51 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-32-generic | <3.0.0-32.51 | 3.0.0-32.51 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-32-server | <3.0.0-32.51 | 3.0.0-32.51 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-32-powerpc-smp | <3.0.0-32.51 | 3.0.0-32.51 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-32-virtual | <3.0.0-32.51 | 3.0.0-32.51 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-32-powerpc | <3.0.0-32.51 | 3.0.0-32.51 |
=11.10 | ||
All of | ||
ubuntu/linux-image-3.0.0-32-generic-pae | <3.0.0-32.51 | 3.0.0-32.51 |
=11.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)