RedHat Linux Kernel Multiple Vulnerabilities
Last Update Date:
21 Aug 2013 18:50
Release Date:
21 Aug 2013
4063
Views
RISK: High Risk
TYPE: Operating Systems - Linux
Multiple vulnerabilities have been identified in RedHat Linux Kernal, which can be exploited by malicious people to cause root compromise, access privileged data, and denial of service.
- A flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled duplicate cookies. If a local user queried SCTP connection information at the same time a remote attacker has initialized a crafted SCTP connection to the system, it could trigger a NULL pointer dereference, causing the system to crash.
- An invalid free flaw was found in the Linux kernel's TCP/IP protocol suite implementation. A local, unprivileged user could use this flaw to corrupt kernel memory via crafted sendmsg() calls, allowing them to cause a denial of service or, potentially, escalate their privileges on the system.
- An invalid pointer dereference flaw was found in the Linux kernel's TCP/IP protocol suite implementation. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system by using sendmsg() with an IPv6 socket connected to an IPv4 destination.
- Information leak flaws in the Linux kernel could allow a privileged, local user to leak kernel memory to user-space.
Impact
- Denial of Service
- Elevation of Privilege
- Information Disclosure
System / Technologies affected
- Red Hat Enterprise Linux Server 5
- Red Hat Enterprise Linux WS/Desktop 5
- Linux variants
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- This update is available via the Red Hat Network.
https://access.redhat.com/site/articles/11258
Vulnerability Identifier
- CVE-2013-2237
- CVE-2013-2234
- CVE-2013-2232
- CVE-2013-2224
- CVE-2013-2206
- CVE-2013-2164
- CVE-2013-2147
- CVE-2012-3552
Source
Related Link
Share with