First published: Thu Jul 04 2013(Updated: )
Dmitry Monakhov reported a race condition flaw the Linux ext4 filesystem that can expose stale data. An unprivileged user could exploit this flaw to cause an information leak. (CVE-2012-4508) Dave Jones discovered that the Linux kernel's socket subsystem does not correctly ensure the keepalive action is associated with a stream socket. A local user could exploit this flaw to cause a denial of service (system crash) by creating a raw socket. (CVE-2012-6657) An information leak was discovered in the Linux kernel's tkill and tgkill system calls when used from compat processes. A local user could exploit this flaw to examine potentially sensitive kernel memory. (CVE-2013-2141) Kees Cook discovered a format string vulnerability in the Broadcom B43 wireless driver for the Linux kernel. A local user could exploit this flaw to gain administrative privileges. (CVE-2013-2852)
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-1900-1 is moderate due to the potential information leak caused by the race condition flaw in the Linux ext4 filesystem.
To fix USN-1900-1, you should update your Linux kernel to the latest version that addresses the race condition vulnerability.
USN-1900-1 affects Ubuntu 10.04 systems running the linux-image-2.6.32-354-ec2 package up to version 2.6.32-354.67.
Dmitry Monakhov reported the race condition flaw that led to the creation of USN-1900-1.
USN-1900-1 is a race condition vulnerability in the Linux ext4 filesystem that can lead to information disclosure.