First published: Tue Dec 03 2013(Updated: )
A flaw was discovered in the Linux kernel's dm snapshot facility. A remote authenticated user could exploit this flaw to obtain sensitive information or modify/corrupt data. (CVE-2013-4299) Alan Chester reported a flaw in the IPv6 Stream Control Transmission Protocol (SCTP) of the Linux kernel. A remote attacker could exploit this flaw to obtain sensitive information by sniffing network traffic. (CVE-2013-4350) Dmitry Vyukov reported a flaw in the Linux kernel's handling of IPv6 UDP Fragmentation Offload (UFO) processing. A remote attacker could leverage this flaw to cause a denial of service (system crash). (CVE-2013-4387) A flaw was discovered in the Linux kernel's fib6 error-code encoding for IPv6. A local user with the CAT_NET_ADMIN capability could exploit this flaw to cause a denial of service (system crash). (CVE-2013-6431)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.8.0-34-generic | <3.8.0-34.49 | 3.8.0-34.49 |
Ubuntu gir1.2-packagekitglib-1.0 | =13.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-2045-1 is classified as a high severity vulnerability due to its potential to allow remote authenticated users to exploit sensitive information.
To resolve USN-2045-1, you should upgrade the linux-image-3.8.0-34-generic package to the latest version available for Ubuntu 13.04.
USN-2045-1 affects the Ubuntu 13.04 operating system running the linux-image-3.8.0-34-generic package.
Yes, USN-2045-1 has the potential to modify or corrupt data if exploited.
The vulnerability USN-2045-1 was reported by Alan Chester.