USN-1995-1: Linux kernel (Raring HWE) vulnerabilities

22 October 2013

Several security issues were fixed in the kernel.

Releases

Packages

Details

An information leak was discovered in the Linux kernel when reading
broadcast messages from the notify_policy interface of the IPSec
key_socket. A local user could exploit this flaw to examine potentially
sensitive information in kernel memory. (CVE-2013-2237)

Kees Cook discovered flaw in the Human Interface Device (HID) subsystem of
the Linux kernel. A physically proximate attacker could exploit this flaw
to execute arbitrary code or cause a denial of service (heap memory
corruption) via a specially crafted device that provides an invalid Report
ID. (CVE-2013-2888)

Kees Cook discovered a flaw in the Human Interface Device (HID) subsystem
of the Linux kerenl when CONFIG_HID_PANTHERLORD is enabled. A physically
proximate attacker could cause a denial of service (heap out-of-bounds
write) via a specially crafted device. (CVE-2013-2892)

Kees Cook discovered a vulnerability in the Linux Kernel's Human Interface
Device (HID) subsystem's support for N-Trig touch screens. A physically
proximate attacker could exploit this flaw to cause a denial of service
(OOPS) via a specially crafted device. (CVE-2013-2896)

Kees Cook discovered an information leak in the Linux kernel's Human
Interface Device (HID) subsystem when CONFIG_HID_SENSOR_HUB is enabled. A
physically proximate attacker could obtain potentially sensitive
information from kernel memory via a specially crafted device.
(CVE-2013-2898)

Kees Cook discovered a flaw in the Human Interface Device (HID) subsystem
of the Linux kernel whe CONFIG_HID_PICOLCD is enabled. A physically
proximate attacker could exploit this flaw to cause a denial of service
(OOPS) via a specially crafted device. (CVE-2013-2899)

A flaw was discovered in how the Linux Kernel's networking stack checks scm
credentials when used with namespaces. A local attacker could exploit this
flaw to gain privileges. (CVE-2013-4300)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.

Related notices

  • USN-2021-1: linux-image-3.5.0-43-powerpc-smp, linux-image-3.5.0-43-highbank, linux-image-3.5.0-43-omap, linux, linux-image-3.5.0-43-generic, linux-image-3.5.0-43-powerpc64-smp
  • USN-1970-1: linux-image-3.5.0-41-generic, linux-lts-quantal
  • USN-2019-1: linux-image-3.5.0-43-generic, linux-lts-quantal
  • USN-2022-1: linux-ti-omap4, linux-image-3.5.0-235-omap4
  • USN-1973-1: linux-image-3.5.0-233-omap4, linux-ti-omap4
  • USN-1977-1: linux-image-2.6.32-357-ec2, linux-ec2
  • USN-1992-1: linux-image-3.2.0-55-highbank, linux-image-3.2.0-55-powerpc64-smp, linux-image-3.2.0-55-omap, linux-image-3.2.0-55-virtual, linux, linux-image-3.2.0-55-powerpc-smp, linux-image-3.2.0-55-generic-pae, linux-image-3.2.0-55-generic
  • USN-1998-1: linux, linux-image-3.8.0-32-generic
  • USN-2024-1: linux-ti-omap4, linux-image-3.5.0-235-omap4
  • USN-1913-1: linux-ec2, linux-image-2.6.32-355-ec2
  • USN-1976-1: linux-image-2.6.32-52-generic, linux-image-2.6.32-52-ia64, linux-image-2.6.32-52-powerpc, linux-image-2.6.32-52-386, linux-image-2.6.32-52-generic-pae, linux-image-2.6.32-52-preempt, linux-image-2.6.32-52-sparc64, linux, linux-image-2.6.32-52-lpia, linux-image-2.6.32-52-versatile, linux-image-2.6.32-52-sparc64-smp, linux-image-2.6.32-52-virtual, linux-image-2.6.32-52-powerpc64-smp, linux-image-2.6.32-52-server, linux-image-2.6.32-52-powerpc-smp
  • USN-1912-1: linux-image-2.6.32-50-powerpc, linux-image-2.6.32-50-386, linux-image-2.6.32-50-server, linux-image-2.6.32-50-virtual, linux-image-2.6.32-50-ia64, linux, linux-image-2.6.32-50-lpia, linux-image-2.6.32-50-sparc64-smp, linux-image-2.6.32-50-powerpc-smp, linux-image-2.6.32-50-powerpc64-smp, linux-image-2.6.32-50-generic-pae, linux-image-2.6.32-50-versatile, linux-image-2.6.32-50-generic, linux-image-2.6.32-50-preempt, linux-image-2.6.32-50-sparc64
  • USN-1993-1: linux-image-3.2.0-1439-omap4, linux-ti-omap4
  • USN-2038-1: linux-image-3.2.0-57-powerpc64-smp, linux-image-3.2.0-57-highbank, linux-image-3.2.0-57-powerpc-smp, linux-image-3.2.0-57-generic-pae, linux, linux-image-3.2.0-57-generic, linux-image-3.2.0-57-omap, linux-image-3.2.0-57-virtual
  • USN-2050-1: linux-image-3.5.0-236-omap4, linux-ti-omap4
  • USN-2039-1: linux-ti-omap4, linux-image-3.2.0-1441-omap4
  • USN-1972-1: linux-image-3.5.0-41-highbank, linux-image-3.5.0-41-powerpc-smp, linux, linux-image-3.5.0-41-omap, linux-image-3.5.0-41-generic, linux-image-3.5.0-41-powerpc64-smp