SB2013112006 - Multiple vulnerabilities in Linux kernel
Published: November 20, 2013 Updated: August 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2014-0203)
The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.
The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.
2) Buffer overflow (CVE-ID: CVE-2013-4588)
The vulnerability allows a local authenticated user to execute arbitrary code.
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system call, related to the do_ip_vs_set_ctl function.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=86acdca1b63e6890540fa19495cfc708beff3d8b
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59309
- http://secunia.com/advisories/59406
- http://secunia.com/advisories/59560
- http://www.securityfocus.com/bid/68125
- https://bugzilla.redhat.com/show_bug.cgi?id=1094363
- https://github.com/torvalds/linux/commit/86acdca1b63e6890540fa19495cfc708beff3d8b
- http://ftp.linux.org.uk/pub/linux/linux-2.6/ChangeLog-2.6.33
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=04bcef2a83f40c6db24222b27a52892cba39dffb
- http://www.openwall.com/lists/oss-security/2013/11/15/12
- http://www.securityfocus.com/bid/63744
- http://www.ubuntu.com/usn/USN-2064-1
- http://www.ubuntu.com/usn/USN-2065-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1030800
- https://github.com/torvalds/linux/commit/04bcef2a83f40c6db24222b27a52892cba39dffb