Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Bonnie King <bonniek-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Important: kernel on SL6.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Wednesday 12th June 2013 16:33:26 UTC (over 3 years ago)
Synopsis:          Important: kernel security, bug fix, and enhancement
update
Advisory ID:       SLSA-2013:0911-1
Issue Date:        2013-06-10
CVE Numbers:       CVE-2013-1935
                   CVE-2013-1943
                   CVE-2013-2017
--

This update fixes the following security issues:

* A flaw was found in the way KVM (Kernel-based Virtual Machine)
initialized a guest's registered pv_eoi (paravirtualized end-of-interrupt)
indication flag when entering the guest. An unprivileged guest user could
potentially use this flaw to crash the host. (CVE-2013-1935, Important)

* A missing sanity check was found in the kvm_set_memory_region() function
in KVM, allowing a user-space process to register memory regions pointing
to the kernel address space. A local, unprivileged user could use this
flaw to escalate their privileges. (CVE-2013-1943, Important)

* A double free flaw was found in the Linux kernel's Virtual Ethernet
Tunnel driver (veth). A remote attacker could possibly use this flaw to
crash a target system. (CVE-2013-2017, Moderate)

The system must be rebooted for this update to take effect.
--

SL6
  x86_64
    kernel-2.6.32-358.11.1.el6.x86_64.rpm
    kernel-debug-2.6.32-358.11.1.el6.x86_64.rpm
    kernel-debug-debuginfo-2.6.32-358.11.1.el6.x86_64.rpm
    kernel-debug-devel-2.6.32-358.11.1.el6.x86_64.rpm
    kernel-debuginfo-2.6.32-358.11.1.el6.x86_64.rpm
    kernel-debuginfo-common-x86_64-2.6.32-358.11.1.el6.x86_64.rpm
    kernel-devel-2.6.32-358.11.1.el6.x86_64.rpm
    kernel-headers-2.6.32-358.11.1.el6.x86_64.rpm
    perf-2.6.32-358.11.1.el6.x86_64.rpm
    perf-debuginfo-2.6.32-358.11.1.el6.x86_64.rpm
    python-perf-debuginfo-2.6.32-358.11.1.el6.x86_64.rpm
    python-perf-2.6.32-358.11.1.el6.x86_64.rpm
  i386
    kernel-2.6.32-358.11.1.el6.i686.rpm
    kernel-debug-2.6.32-358.11.1.el6.i686.rpm
    kernel-debug-debuginfo-2.6.32-358.11.1.el6.i686.rpm
    kernel-debug-devel-2.6.32-358.11.1.el6.i686.rpm
    kernel-debuginfo-2.6.32-358.11.1.el6.i686.rpm
    kernel-debuginfo-common-i686-2.6.32-358.11.1.el6.i686.rpm
    kernel-devel-2.6.32-358.11.1.el6.i686.rpm
    kernel-headers-2.6.32-358.11.1.el6.i686.rpm
    perf-2.6.32-358.11.1.el6.i686.rpm
    perf-debuginfo-2.6.32-358.11.1.el6.i686.rpm
    python-perf-debuginfo-2.6.32-358.11.1.el6.i686.rpm
    python-perf-2.6.32-358.11.1.el6.i686.rpm
  noarch
    kernel-doc-2.6.32-358.11.1.el6.noarch.rpm
    kernel-firmware-2.6.32-358.11.1.el6.noarch.rpm

- Scientific Linux Development Team
 
CD: 3ms