<div dir="ltr"><div><div>Guys,<br><br></div>Has this been fixed in the pve-kernel 2.6 ?! This has just been patched in debian last night (CET).<br><br>Let me know,<br></div>Iosif<br></div><div class="gmail_extra"><br><br><div class="gmail_quote">
On Fri, Apr 25, 2014 at 2:12 AM, dann frazier <span dir="ltr"><<a href="mailto:dannf@debian.org" target="_blank">dannf@debian.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA1<br>
<br>
- ----------------------------------------------------------------------<br>
Debian Security Advisory DSA-2906-1 <a href="mailto:security@debian.org">security@debian.org</a><br>
<a href="http://www.debian.org/security/" target="_blank">http://www.debian.org/security/</a> Dann Frazier<br>
April 24, 2014 <a href="http://www.debian.org/security/faq" target="_blank">http://www.debian.org/security/faq</a><br>
- ----------------------------------------------------------------------<br>
<br>
Package : linux-2.6<br>
Vulnerability : privilege escalation/denial of service/information leak<br>
Problem type : local/remote<br>
Debian-specific: no<br>
CVE Id(s) : CVE-2013-0343 CVE-2013-2147 CVE-2013-2889 CVE-2013-2893<br>
CVE-2013-4162 CVE-2013-4299 CVE-2013-4345 CVE-2013-4512<br>
CVE-2013-4587 CVE-2013-6367 CVE-2013-6380 CVE-2013-6381<br>
CVE-2013-6382 CVE-2013-6383 CVE-2013-7263 CVE-2013-7264<br>
CVE-2013-7265 CVE-2013-7339 CVE-2014-0101 CVE-2014-1444<br>
CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2014-2039<br>
CVE-2014-2523 CVE-2103-2929<br>
<br>
Several vulnerabilities have been discovered in the Linux kernel that may lead<br>
to a denial of service, information leak or privilege escalation. The Common<br>
Vulnerabilities and Exposures project identifies the following problems:<br>
<br>
CVE-2013-0343<br>
<br>
George Kargiotakis reported an issue in the temporary address handling<br>
of the IPv6 privacy extensions. Users on the same LAN can cause a denial<br>
of service or obtain access to sensitive information by sending router<br>
advertisement messages that cause temporary address generation to be<br>
disabled.<br>
<br>
CVE-2013-2147<br>
<br>
Dan Carpenter reported issues in the cpqarray driver for Compaq<br>
Smart2 Controllers and the cciss driver for HP Smart Array controllers<br>
allowing users to gain access to sensitive kernel memory.<br>
<br>
CVE-2013-2889<br>
<br>
Kees Cook discovered missing input sanitization in the HID driver for<br>
Zeroplus game pads that could lead to a local denial of service.<br>
<br>
CVE-2013-2893<br>
<br>
Kees Cook discovered that missing input sanitization in the HID driver<br>
for various Logitech force feedback devices could lead to a local denial<br>
of service.<br>
<br>
CVE-2013-2929<br>
<br>
Vasily Kulikov discovered that a flaw in the get_dumpable() function of<br>
the ptrace subsytsem could lead to information disclosure. Only systems<br>
with the fs.suid_dumpable sysctl set to a non-default value of '2' are<br>
vulnerable.<br>
<br>
CVE-2013-4162<br>
<br>
Hannes Frederic Sowa discovered that incorrect handling of IPv6 sockets<br>
using the UDP_CORK option could result in denial of service.<br>
<br>
CVE-2013-4299<br>
<br>
Fujitsu reported an issue in the device-mapper subsystem. Local users<br>
could gain access to sensitive kernel memory.<br>
<br>
CVE-2013-4345<br>
<br>
Stephan Mueller found in bug in the ANSI pseudo random number generator<br>
which could lead to the use of less entropy than expected.<br>
<br>
CVE-2013-4512<br>
<br>
Nico Golde and Fabian Yamaguchi reported an issue in the user mode<br>
linux port. A buffer overflow condition exists in the write method<br>
for the /proc/exitcode file. Local users with sufficient privileges<br>
allowing them to write to this file could gain further elevated<br>
privileges.<br>
<br>
CVE-2013-4587<br>
<br>
Andrew Honig of Google reported an issue in the KVM virtualization<br>
subsystem. A local user could gain elevated privileges by passing<br>
a large vcpu_id parameter.<br>
<br>
CVE-2013-6367<br>
<br>
Andrew Honig of Google reported an issue in the KVM virtualization<br>
subsystem. A divide-by-zero condition could allow a guest user to<br>
cause a denial of service on the host (crash).<br>
<br>
CVE-2013-6380<br>
<br>
Mahesh Rajashekhara reported an issue in the aacraid driver for storage<br>
products from various vendors. Local users with CAP_SYS_ADMIN privileges<br>
could gain further elevated privileges.<br>
<br>
CVE-2013-6381<br>
<br>
Nico Golde and Fabian Yamaguchi reported an issue in the Gigabit Ethernet<br>
device support for s390 systems. Local users could cause a denial of<br>
service or gain elevated privileges via the SIOC_QETH_ADP_SET_SNMP_CONTROL<br>
ioctl.<br>
<br>
CVE-2013-6382<br>
<br>
Nico Golde and Fabian Yamaguchi reported an issue in the XFS filesystem.<br>
Local users with CAP_SYS_ADMIN privileges could gain further elevated<br>
privileges.<br>
<br>
CVE-2013-6383<br>
<br>
Dan Carpenter reported an issue in the aacraid driver for storage devices<br>
from various vendors. A local user could gain elevated privileges due to<br>
a missing privilege level check in the aac_compat_ioctl function.<br>
<br>
CVE-2013-7263 CVE-2013-7264 CVE-2013-7265<br>
<br>
mpb reported an information leak in the recvfrom, recvmmsg and recvmsg<br>
system calls. A local user could obtain access to sensitive kernel memory.<br>
<br>
CVE-2013-7339<br>
<br>
Sasha Levin reported an issue in the RDS network protocol over Infiniband.<br>
A local user could cause a denial of service condition.<br>
<br>
CVE-2014-0101<br>
<br>
Nokia Siemens Networks reported an issue in the SCTP network protocol<br>
subsystem. Remote users could cause a denial of service (NULL pointer<br>
dereference).<br>
<br>
CVE-2014-1444<br>
<br>
Salva Peiro reported an issue in the FarSync WAN driver. Local users<br>
with the CAP_NET_ADMIN capability could gain access to sensitive kernel<br>
memory.<br>
<br>
CVE-2014-1445<br>
<br>
Salva Peiro reported an issue in the wanXL serial card driver. Local<br>
users could gain access to sensitive kernel memory.<br>
<br>
CVE-2014-1446<br>
<br>
Salva Peiro reported an issue in the YAM radio modem driver. Local users<br>
with the CAP_NET_ADMIN capability could gain access to sensitive kernel<br>
memory.<br>
<br>
CVE-2014-1874<br>
<br>
Matthew Thode reported an issue in the SELinux subsystem. A local user<br>
with CAP_MAC_ADMIN privileges could cause a denial of service by setting<br>
an empty security context on a file.<br>
<br>
CVE-2014-2039<br>
<br>
Martin Schwidefsky reported an issue on s390 systems. A local user<br>
could cause a denial of service (kernel oops) by executing an application<br>
with a linkage stack instruction.<br>
<br>
CVE-2014-2523<br>
<br>
Daniel Borkmann provided a fix for an issue in the nf_conntrack_dccp<br>
module. Remote users could cause a denial of service (system crash)<br>
or potentially gain elevated privileges.<br>
<br>
For the oldstable distribution (squeeze), this problem has been fixed in<br>
version 2.6.32-48squeeze5.<br>
<br>
The following matrix lists additional source packages that were rebuilt for<br>
compatibility with or to take advantage of this update:<br>
<br>
Debian 6.0 (squeeze)<br>
user-mode-linux 2.6.32-1um-4+48squeeze5<br>
<br>
We recommend that you upgrade your linux-2.6 and user-mode-linux packages.<br>
<br>
Note: Debian carefully tracks all known security issues across every<br>
linux kernel package in all releases under active security support.<br>
However, given the high frequency at which low-severity security<br>
issues are discovered in the kernel and the resource requirements of<br>
doing an update, updates for lower priority issues will normally not<br>
be released for all kernels at the same time. Rather, they will be<br>
released in a staggered or "leap-frog" fashion.<br>
<br>
Further information about Debian Security Advisories, how to apply<br>
these updates to your system and frequently asked questions can be<br>
found at: <a href="http://www.debian.org/security/" target="_blank">http://www.debian.org/security/</a><br>
<br>
Mailing list: <a href="mailto:debian-security-announce@lists.debian.org">debian-security-announce@lists.debian.org</a><br>
-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG v1<br>
<br>
iQIcBAEBAgAGBQJTWaeAAAoJEBv4PF5U/IZAzFkP/2+YLfDXhZaBIoR1gugvac+F<br>
q3/PgKXURH35N2vOU3pTkmYgwZh6gOHCzLJ3/ae2qL2GDTw5ZLu2EYv+xiJLOk8a<br>
9k5dki6j2k38EI7ktTn7BMVfOgoZTmlfYYVjdGmRU+2YEXu1ATr4zt0wN4azvThU<br>
25sgo21rYcaMPvOwng922/RAFQPtDZmAODTXxfpkL6c/zzeMLOILqlAYRe9uMfu5<br>
4X8G1/wglfSzx6b4yWZPvltWCgW+yi3OklrAalSsn8PnDf7yS8wWmxXsZ0pOEHHV<br>
7bbUCMDYtUkqqTq9/Ak/ohGo3mJkPJnzSeg8ShemSEY40NTlIbSmfUTYepTovhCF<br>
A7A8TmYUhsAavD+DUxbQvYJjRKufzsymCg3yA0qp9JTKVRr5/IVkqpSeAx2Hpo7C<br>
Jqkf0Or4t9BYc5juJasgicb4ttyYlleGnlJ8+ojelxXLROkH8EnIv3CDP87WGnOt<br>
Dora/G+Al0AmRuk6TQuZofMtXK9dcBanN2+jr7HipE6dnH7vMo7xn979NdEaTkHs<br>
Yskm+FJJXFoTGS49/V2YlIhDU2zuCnXodGYsZl+RSI54XPMkKrrfKZ6zRIJ5r3vJ<br>
IFiqcMUlNJtEU4viwMjBkXlMvQZoN0e44ufK+/+VfQYPrj3puYoYLq1FOeF0JFaE<br>
8D7zI3prwl5DKG9kWEaq<br>
=T6VL<br>
-----END PGP SIGNATURE-----<br>
<span class="HOEnZb"><font color="#888888"><br>
<br>
--<br>
To UNSUBSCRIBE, email to <a href="mailto:debian-security-announce-REQUEST@lists.debian.org">debian-security-announce-REQUEST@lists.debian.org</a><br>
with a subject of "unsubscribe". Trouble? Contact <a href="mailto:listmaster@lists.debian.org">listmaster@lists.debian.org</a><br>
Archive: <a href="https://lists.debian.org/20140425001210.GA6824@fluid.dannf" target="_blank">https://lists.debian.org/20140425001210.GA6824@fluid.dannf</a><br>
<br>
</font></span></blockquote></div><br></div>