First published: Mon Apr 08 2013(Updated: )
Emese Revfy discovered that in the Linux kernel signal handlers could leak address information across an exec, making it possible to by pass ASLR (Address Space Layout Randomization). A local user could use this flaw to by pass ASLR to reliably deliver an exploit payload that would otherwise be stopped (by ASLR). (CVE-2013-0914) A memory use after free error was discover in the Linux kernel's tmpfs filesystem. A local user could exploit this flaw to gain privileges or cause a denial of service (system crash). (CVE-2013-1767) Mateusz Guzik discovered a race in the Linux kernel's keyring. A local user could exploit this flaw to cause a denial of service (system crash). (CVE-2013-1792) Mathias Krause discovered a memory leak in the Linux kernel's crypto report API. A local user with CAP_NET_ADMIN could exploit this leak to examine some of the kernel's stack memory. (CVE-2013-2546) Mathias Krause discovered a memory leak in the Linux kernel's crypto report API. A local user with CAP_NET_ADMIN could exploit this leak to examine some of the kernel's heap memory. (CVE-2013-2547) Mathias Krause discovered information leaks in the Linux kernel's crypto algorithm report API. A local user could exploit these flaws to leak kernel stack and heap memory contents. (CVE-2013-2548)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.2.0-40-omap | <3.2.0-40.64 | 3.2.0-40.64 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-40-generic | <3.2.0-40.64 | 3.2.0-40.64 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-40-powerpc-smp | <3.2.0-40.64 | 3.2.0-40.64 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-40-powerpc64-smp | <3.2.0-40.64 | 3.2.0-40.64 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-40-virtual | <3.2.0-40.64 | 3.2.0-40.64 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-40-generic-pae | <3.2.0-40.64 | 3.2.0-40.64 |
Ubuntu 22.04 LTS | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-40-highbank | <3.2.0-40.64 | 3.2.0-40.64 |
Ubuntu 22.04 LTS | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-1793-1 is high, as it allows local users to bypass address space layout randomization (ASLR).
To fix USN-1793-1, update your Linux kernel to version 3.2.0-40.64 or later for affected Ubuntu 12.04 systems.
USN-1793-1 affects Ubuntu 12.04 systems running specific versions of the Linux kernel.
The potential impacts of USN-1793-1 include increased risk of exploitation through reliable delivery of payloads due to the bypass of ASLR.
The vulnerability addressed by USN-1793-1 was discovered by Emese Revfy.