2013-12-06
ALT-BU-2013-1423-2
Branch sisyphus update bulletin.
Closed vulnerabilities
Published: 2013-12-14
Modified: 2026-04-29
Modified: 2026-04-29
CVE-2013-7069
ack 2.00 through 2.11_02 allows remote attackers to execute arbitrary code via a (1) --pager, (2) --regex, or (3) --output option in a .ackrc file in a directory to be searched.
Severity: MEDIUM (6.8)Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
References:
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00094.html
- http://seclists.org/oss-sec/2013/q4/484
- http://secunia.com/advisories/55982
- http://www.securityfocus.com/bid/64196
- https://github.com/petdance/ack2/issues/399
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00094.html
- http://seclists.org/oss-sec/2013/q4/484
- http://secunia.com/advisories/55982
- http://www.securityfocus.com/bid/64196
- https://github.com/petdance/ack2/issues/399
Package kernel-image-un-def updated to version 3.12.3-alt1 for branch sisyphus in task 110009.
Closed vulnerabilities
Published: 2016-07-05
Modified: 2026-04-30
Modified: 2026-04-30
BDU:2014-00097
Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии
Severity: MEDIUM (6.9)Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
References:
Published: 2013-11-27
Modified: 2026-04-29
Modified: 2026-04-29
CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
Severity: MEDIUM (6.9)Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
References:
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fb392b1a63ae36c31f62bc3fc8630b49d602b62
- http://rhn.redhat.com/errata/RHSA-2014-0159.html
- http://rhn.redhat.com/errata/RHSA-2014-0284.html
- http://rhn.redhat.com/errata/RHSA-2014-0285.html
- http://www.openwall.com/lists/oss-security/2013/11/22/5
- http://www.securityfocus.com/bid/63890
- https://bugzilla.redhat.com/show_bug.cgi?id=1033600
- https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fb392b1a63ae36c31f62bc3fc8630b49d602b62
- http://rhn.redhat.com/errata/RHSA-2014-0159.html
- http://rhn.redhat.com/errata/RHSA-2014-0284.html
- http://rhn.redhat.com/errata/RHSA-2014-0285.html
- http://www.openwall.com/lists/oss-security/2013/11/22/5
- http://www.securityfocus.com/bid/63890
- https://bugzilla.redhat.com/show_bug.cgi?id=1033600
- https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62
