- Home
- CVEs with nessus.description==Updated+kernel-rt+packages+that+fix+multiple+security+issues+and+one+bug+are+now+available+for+Red+Hat+Enterprise+MRG+2.4.%0A%0AThe+Red+Hat+Security+Response+Team+has+rated+this+update+as+having+important+security+impact.+Common+Vulnerability+Scoring+System+%28CVSS%29+base+scores%2C+which+give+detailed+severity+ratings%2C+are+available+for+each+vulnerability+from+the+CVE+links+in+the+References+section.%0A%0AThe+kernel-rt+packages+contain+the+Linux+kernel%2C+the+core+of+any+Linux+operating+system.%0A%0A%2A+A+flaw+was+found+in+the+way+IP+packets+with+an+Internet+Header+Length+%28ihl%29+of+zero+were+processed+in+the+skb_flow_dissect%28%29+function+in+the+Linux+kernel.+A+remote+attacker+could+use+this+flaw+to+trigger+an+infinite+loop+in+the+kernel%2C+leading+to+a+denial+of+service.%0A%28CVE-2013-4348%2C+Important%29%0A%0A%2A+A+flaw+was+found+in+the+way+the+Linux+kernel%27s+IPv6+implementation+handled+certain+UDP+packets+when+the+UDP+Fragmentation+Offload+%28UFO%29+feature+was+enabled.+A+remote+attacker+could+use+this+flaw+to+crash+the+system+or%2C+potentially%2C+escalate+their+privileges+on+the+system.%0A%28CVE-2013-4387%2C+Important%29%0A%0A%2A+A+flaw+was+found+in+the+way+the+Linux+kernel+handled+the+creation+of+temporary+IPv6+addresses.+If+the+IPv6+privacy+extension+was+enabled+%28%2Fproc%2Fsys%2Fnet%2Fipv6%2Fconf%2Feth0%2Fuse_tempaddr+set+to+%272%27%29%2C+an+attacker+on+the+local+network+could+disable+IPv6+temporary+address+generation%2C+leading+to+a+potential+information+disclosure.+%28CVE-2013-0343%2C+Moderate%29%0A%0A%2A+A+flaw+was+found+in+the+way+the+Linux+kernel+handled+HID+%28Human+Interface+Device%29+reports+with+an+out-of-bounds+Report+ID.+An+attacker+with+physical+access+to+the+system+could+use+this+flaw+to+crash+the+system+or%2C+potentially%2C+escalate+their+privileges+on+the+system.%0A%28CVE-2013-2888%2C+Moderate%29%0A%0A%2A+Heap-based+buffer+overflow+flaws+were+found+in+the+way+the+Pantherlord%2FGreenAsia+game+controller+driver%2C+the+Logitech+force+feedback+drivers%2C+and+the+Logitech+Unifying+receivers+driver+handled+HID+reports.+An+attacker+with+physical+access+to+the+system+could+use+these+flaws+to+crash+the+system+or%2C+potentially%2C+escalate+their+privileges+on+the+system.+%28CVE-2013-2892%2C+CVE-2013-2893%2C+CVE-2013-2895%2C+Moderate%29%0A%0A%2A+A+NULL+pointer+dereference+flaw+was+found+in+the+way+the+N-Trig+touch+screen+driver+handled+HID+reports.+An+attacker+with+physical+access+to+the+system+could+use+this+flaw+to+crash+the+system%2C+resulting+in+a+denial+of+service.+%28CVE-2013-2896%2C+Moderate%29%0A%0A%2A+An+information+leak+flaw+was+found+in+the+way+the+Linux+kernel%27s+device+mapper+subsystem%2C+under+certain+conditions%2C+interpreted+data+written+to+snapshot+block+devices.+An+attacker+could+use+this+flaw+to+read+data+from+disk+blocks+in+free+space%2C+which+are+normally+inaccessible.+%28CVE-2013-4299%2C+Moderate%29%0A%0A%2A+A+use-after-free+flaw+was+found+in+the+tun_set_iff%28%29+function+in+the+Universal+TUN%2FTAP+device+driver+implementation+in+the+Linux+kernel.+A+privileged+user+could+use+this+flaw+to+crash+the+system+or%2C+potentially%2C+further+escalate+their+privileges+on+the+system.%0A%28CVE-2013-4343%2C+Moderate%29%0A%0A%2A+An+off-by-one+flaw+was+found+in+the+way+the+ANSI+CPRNG+implementation+in+the+Linux+kernel+processed+non-block+size+aligned+requests.+This+could+lead+to+random+numbers+being+generated+with+less+bits+of+entropy+than+expected+when+ANSI+CPRNG+was+used.%0A%28CVE-2013-4345%2C+Moderate%29%0A%0A%2A+A+flaw+was+found+in+the+way+the+Linux+kernel%27s+IPv6+SCTP+implementation+interacted+with+the+IPsec+subsystem.+This+resulted+in+unencrypted+SCTP+packets+being+sent+over+the+network+even+though+IPsec+encryption+was+enabled.+An+attacker+able+to+inspect+these+SCTP+packets+could+use+this+flaw+to+obtain+potentially+sensitive+information.%0A%28CVE-2013-4350%2C+Moderate%29%0A%0ARed+Hat+would+like+to+thank+Fujitsu+for+reporting+CVE-2013-4299+and+Stephan+Mueller+for+reporting+CVE-2013-4345.+The+CVE-2013-4348+issue+was+discovered+by+Jason+Wang+of+Red+Hat.%0A%0ABug+fix+%3A%0A%0A%2A+RoCE+appeared+to+be+supported+in+the+MRG+Realtime+kernel+even+when+the+required+user+space+packages+from+the+HPN+channel+were+not+installed.+The+Realtime+kernel+now+checks+for+the+HPN+channel+packages+before+exposing+the+RoCE+interfaces.+RoCE+devices+appear+as+plain+10GigE+devices+if+the+needed+HPN+channel+user+space+packages+are+not+installed.+%28BZ%231012993%29%0A%0AUsers+should+upgrade+to+these+updated+packages%2C+which+upgrade+the+kernel-rt+kernel+to+version+kernel-rt-3.8.13-rt14%2C+and+correct+these+issues.+The+system+must+be+rebooted+for+this+update+to+take+effect
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top