MGASA-2013-0069
Date: | February 22nd, 2013 |
Affected releases: | 2 |
Media: | Core |
Description:
This kernel-vserver update provides upstream 3.4.32 kernel and resolves the
following security issues:
The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and
other versions, when running a 32-bit PVOPS guest, allows local users to
cause a denial of service (guest crash) by triggering an iret fault,
leading to use of an incorrect stack pointer and stack corruption.
(CVE-2013-0190 / XSA-40)
Linux kernel when returning from an iret assumes that %ds segment is safe
and uses it to reference various per-cpu related fields. Unfortunately
the user can modify the LDT and provide a NULL one. Whenever an iret is
called we end up in xen_iret and try to use the %ds segment and cause an
general protection fault.
Malicious or buggy unprivileged user space can cause the guest kernel to
crash, or permit a privilege escalation within the guest, or operate
erroneously. (CVE-2013-0228 / XSA-42)
Access to /dev/cpu/*/msr was protected only using filesystem checks. A
local uid 0 (root) user with all capabilities dropped could use this
flaw to execute arbitrary code in kernel mode. (CVE-2013-0268)
Linux kernel built with Extended Verification Module(EVM) and configured
properly, is vulnerable to a NULL pointer de-reference flaw, caused by
accessing extended attribute routines of sockfs inode object.
An unprivileged user/program could use this to crash the kernel, resulting
in DoS. (CVE-2013-0313)
A flaw was found in the way __skb_recv_datagram() processed skbs with no
payload when MSG_PEEK was requested. An unprivileged local user could use
this flaw to cause local denial of service. (CVE-2013-0290)
A race conditon in ptrace can lead to kernel stack corruption and arbitrary
kernel-mode code execution. (CVE-2013-0871)
A flaw was found in how printk manages buffers when calling log_prefix
function from call_console_drivers creating a buffer overflow.
An unprivileged local user could use this flaw to cause local denial
of service. (CVE pending)
Other fixes in this release:
adds Intel Lynx Point-LP, Haswell and Wellsburg support to ata/ahci,
smbus, watchdog
Updated Packages:
i586:
kernel-vserver-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-vserver-devel-3.4.32-2.mga2-1-1.mga2.i586.rpm
kernel-vserver-devel-latest-3.4.32-2.mga2.i586.rpm
kernel-vserver-doc-3.4.32-2.mga2.noarch.rpm
kernel-vserver-latest-3.4.32-2.mga2.i586.rpm
kernel-vserver-source-3.4.32-2.mga2-1-1.mga2.noarch.rpm
kernel-vserver-source-latest-3.4.32-2.mga2.noarch.rpm
x86_64:
kernel-vserver-3.4.32-2.mga2-1-1.mga2.x86_64.rpm
kernel-vserver-devel-3.4.32-2.mga2-1-1.mga2.x86_64.rpm
kernel-vserver-devel-latest-3.4.32-2.mga2.x86_64.rpm
kernel-vserver-doc-3.4.32-2.mga2.noarch.rpm
kernel-vserver-latest-3.4.32-2.mga2.x86_64.rpm
kernel-vserver-source-3.4.32-2.mga2-1-1.mga2.noarch.rpm
kernel-vserver-source-latest-3.4.32-2.mga2.noarch.rpm
SRPMS:
kernel-vserver-3.4.32-2.mga2.src.rpm
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0190
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0268
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0290
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0313
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0871
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.25
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.26
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.27
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.28
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.29
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.30
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.31
http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.4.32
https://bugs.mageia.org/show_bug.cgi?id=9121