USN-1683-1: Linux kernel vulnerability

10 January 2013

The system could be made to leak sensitive system information.

Releases

Packages

Details

A flaw was discovered in the Linux kernel's handling of script execution
when module loading is enabled. A local attacker could exploit this flaw to
cause a leak of kernel stack contents.

References

Related notices

  • USN-1696-1: linux-image-3.2.0-36-virtual, linux-image-3.2.0-36-highbank, linux-image-3.2.0-36-omap, linux-image-3.2.0-36-generic, linux-image-3.2.0-36-powerpc-smp, linux-image-3.2.0-36-powerpc64-smp, linux-image-3.2.0-36-generic-pae, linux
  • USN-1699-1: linux-image-3.5.0-22-powerpc64-smp, linux-image-3.5.0-22-highbank, linux-image-3.5.0-22-omap, linux, linux-image-3.5.0-22-powerpc-smp, linux-image-3.5.0-22-generic
  • USN-1704-1: linux-image-3.5.0-22-generic, linux-lts-quantal
  • USN-1684-1: linux-image-2.6.32-350-ec2, linux-ec2
  • USN-1689-1: linux-image-3.0.0-30-server, linux-image-3.0.0-30-generic, linux-image-3.0.0-30-omap, linux-image-3.0.0-30-powerpc, linux-image-3.0.0-30-powerpc64-smp, linux-image-3.0.0-30-powerpc-smp, linux-image-3.0.0-30-virtual, linux-image-3.0.0-30-generic-pae, linux
  • USN-1688-1: linux-image-3.0.0-30-server, linux-lts-backport-oneiric, linux-image-3.0.0-30-generic, linux-image-3.0.0-30-virtual, linux-image-3.0.0-30-generic-pae
  • USN-1698-1: linux-image-3.2.0-1424-omap4, linux-ti-omap4
  • USN-1700-1: linux-image-3.5.0-217-omap4, linux-ti-omap4
  • USN-1691-1: linux-image-3.0.0-1220-omap4, linux-ti-omap4