First published: Fri Mar 07 2014(Updated: )
An information leak was discovered in the Linux kernel when built with the NetFilter Connection Tracking (NF_CONNTRACK) support for IRC protocol (NF_NAT_IRC). A remote attacker could exploit this flaw to obtain potentially sensitive kernel information when communicating over a client- to-client IRC connection(/dcc) via a NAT-ed network. (CVE-2014-1690) Matthew Thode reported a denial of service vulnerability in the Linux kernel when SELinux support is enabled. A local user with the CAP_MAC_ADMIN capability (and the SELinux mac_admin permission if running in enforcing mode) could exploit this flaw to cause a denial of service (kernel crash). (CVE-2014-1874) An information leak was discovered in the Linux kernel's NFS filesystem. A local users with write access to an NFS share could exploit this flaw to obtain potential sensative information from kernel memory. (CVE-2014-2038)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.11.0-18-generic-lpae | <3.11.0-18.32 | 3.11.0-18.32 |
Ubuntu gir1.2-packagekitglib-1.0 | =13.10 | |
All of | ||
ubuntu/linux-image-3.11.0-18-generic | <3.11.0-18.32 | 3.11.0-18.32 |
Ubuntu gir1.2-packagekitglib-1.0 | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-2140-1 is considered to be high due to its potential for information leakage.
To fix USN-2140-1, upgrade your system to use the patched versions of the affected linux-image packages.
USN-2140-1 affects users of Ubuntu 13.10 that are running specific versions of the Linux kernel with NF_CONNTRACK support for IRC.
An attacker leveraging USN-2140-1 could potentially access sensitive kernel information.
Yes, USN-2140-1 specifically affects the Linux kernel version up to 3.11.0-18.32 on Ubuntu 13.10.