Executive Summary
Summary | |
---|---|
Title | Linux kernel (OMAP4) vulnerability |
Informations | |||
---|---|---|---|
Name | USN-1999-1 | First vendor Publication | 2013-10-22 |
Vendor | Ubuntu | Last vendor Modification | 2013-10-22 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.04 Summary: The system could be made to expose sensitive information to a local user. Software Description: - linux-ti-omap4: Linux kernel for OMAP4 Details: Dan Carpenter discovered an information leak in the HP Smart Array and Compaq SMART2 disk-array driver in the Linux kernel. A local user could exploit this flaw to obtain sensitive information from kernel memory. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.04: After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-1999-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18987 | |||
Oval ID: | oval:org.mitre.oval:def:18987 | ||
Title: | USN-2018-1 -- linux-ti-omap4 vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2018-1 CVE-2012-5374 CVE-2012-5375 CVE-2013-2147 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19069 | |||
Oval ID: | oval:org.mitre.oval:def:19069 | ||
Title: | USN-2017-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2017-1 CVE-2012-5374 CVE-2012-5375 CVE-2013-2147 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19273 | |||
Oval ID: | oval:org.mitre.oval:def:19273 | ||
Title: | USN-1994-1 -- linux-lts-quantal vulnerability | ||
Description: | The system could be made to expose sensitive information to a local user. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1994-1 CVE-2013-2147 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-quantal |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19339 | |||
Oval ID: | oval:org.mitre.oval:def:19339 | ||
Title: | USN-1997-1 -- linux-ti-omap4 vulnerability | ||
Description: | The system could be made to expose sensitive information to a local user. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1997-1 CVE-2013-2147 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19344 | |||
Oval ID: | oval:org.mitre.oval:def:19344 | ||
Title: | USN-1999-1 -- linux-ti-omap4 vulnerability | ||
Description: | The system could be made to expose sensitive information to a local user. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1999-1 CVE-2013-2147 | Version: | 5 |
Platform(s): | Ubuntu 13.04 | Product(s): | linux-ti-omap4 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19368 | |||
Oval ID: | oval:org.mitre.oval:def:19368 | ||
Title: | USN-1996-1 -- linux vulnerability | ||
Description: | The system could be made to expose sensitive information to a local user. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1996-1 CVE-2013-2147 | Version: | 5 |
Platform(s): | Ubuntu 12.10 | Product(s): | linux |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24081 | |||
Oval ID: | oval:org.mitre.oval:def:24081 | ||
Title: | VMware ESX updates to third party libraries | ||
Description: | The HP Smart Array controller disk-array driver and Compaq SMART2 controller disk-array driver in the Linux kernel through 3.9.4 do not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via (1) a crafted IDAGETPCIINFO command for a /dev/ida device, related to the ida_locked_ioctl function in drivers/block/cpqarray.c or (2) a crafted CCISS_PASSTHRU32 command for a /dev/cciss device, related to the cciss_ioctl32_passthru function in drivers/block/cciss.c. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2013-2147 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0057.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_esx_VMSA-2013-0015_remote.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0812-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1832-1.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1264.nasl - Type : ACT_GATHER_INFO |
2014-04-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2906.nasl - Type : ACT_GATHER_INFO |
2014-02-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3002.nasl - Type : ACT_GATHER_INFO |
2013-12-06 | Name : The remote VMware ESX host is missing one or more security-related patches. File : vmware_VMSA-2013-0015.nasl - Type : ACT_GATHER_INFO |
2013-11-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2016-1.nasl - Type : ACT_GATHER_INFO |
2013-11-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2023-1.nasl - Type : ACT_GATHER_INFO |
2013-11-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2020-1.nasl - Type : ACT_GATHER_INFO |
2013-11-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2017-1.nasl - Type : ACT_GATHER_INFO |
2013-11-09 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2015-1.nasl - Type : ACT_GATHER_INFO |
2013-10-22 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1996-1.nasl - Type : ACT_GATHER_INFO |
2013-10-22 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1994-1.nasl - Type : ACT_GATHER_INFO |
2013-08-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1166.nasl - Type : ACT_GATHER_INFO |
2013-08-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-1166-1.nasl - Type : ACT_GATHER_INFO |
2013-08-22 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-1166.nasl - Type : ACT_GATHER_INFO |
2013-08-22 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130820_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-08-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1166.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-194.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Fedora host is missing a security update. File : fedora_2013-9123.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Fedora host is missing a security update. File : fedora_2013-10695.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Fedora host is missing a security update. File : fedora_2013-10689.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2013-10-22 09:18:55 |
|