Debian: DSA-2632-1: linux-2.6 security update

    Date25 Feb 2013
    CategoryDebian
    92
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems:
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ----------------------------------------------------------------------
    Debian Security Advisory DSA-2632-1                This email address is being protected from spambots. You need JavaScript enabled to view it.
    	
    http://www.debian.org/security/                           Dann Frazier
    February 25, 2013                   http://www.debian.org/security/faq
    - ----------------------------------------------------------------------
    
    Package        : linux-2.6
    Vulnerability  : privilege escalation/denial of service
    Problem type   : local
    Debian-specific: no
    CVE Id(s)      : CVE-2013-0231 CVE-2013-0871
    
    Several vulnerabilities have been discovered in the Linux kernel that may lead
    to a denial of service or privilege escalation. The Common Vulnerabilities and
    Exposures project identifies the following problems:
    
    CVE-2013-0231
    
        Jan Beulich provided a fix for an issue in the Xen PCI backend drivers.
        Users of guests on a system using passed-through PCI devices can create
        a denial of service of the host system due to the use of non-ratelimited
        kernel log messages.
    
    CVE-2013-0871
    
        Suleiman Souhlal and Salman Qazi of Google, with help from Aaron Durbin
        and Michael Davidson of Google, discovered an issue in the
        ptrace subsystem. Due to a race condition with PTRACE_SETREGS, local users
        can cause kernel stack corruption and execution of arbitrary code.
    
    For the stable distribution (squeeze), this problem has been fixed in version
    2.6.32-48squeeze1.
    
    The following matrix lists additional source packages that were rebuilt for
    compatibility with or to take advantage of this update:
    
                                                 Debian 6.0 (squeeze)
         user-mode-linux                         2.6.32-1um-4+48squeeze1
    
    We recommend that you upgrade your linux-2.6 and user-mode-linux packages.
    
    Thanks to Micah Anderson for proof reading this text.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"37","type":"x","order":"1","pct":51.39,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":13.89,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":34.72,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.