ALT-BU-2013-1431-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-11
CVE-2013-6824
Zabbix before 1.8.19rc1, 2.0 before 2.0.10rc1, and 2.2 before 2.2.1rc1 allows remote Zabbix servers and proxies to execute arbitrary commands via a newline in a flexible user parameter.
- http://security.gentoo.org/glsa/glsa-201401-26.xml
- http://www.zabbix.com/rn1.8.19rc1.php
- http://www.zabbix.com/rn2.0.10rc1.php
- http://www.zabbix.com/rn2.2.1rc1.php
- https://support.zabbix.com/browse/ZBX-7479
- http://security.gentoo.org/glsa/glsa-201401-26.xml
- http://www.zabbix.com/rn1.8.19rc1.php
- http://www.zabbix.com/rn2.0.10rc1.php
- http://www.zabbix.com/rn2.2.1rc1.php
- https://support.zabbix.com/browse/ZBX-7479
Package kernel-image-un-def updated to version 3.12.4-alt1 for branch sisyphus in task 110234.
Closed vulnerabilities
Modified: 2016-11-28
BDU:2014-00100
Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфиденциальной информации из памяти ядра
Modified: 2025-04-11
CVE-2013-4563
The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly perform a certain size comparison before inserting a fragment header, which allows remote attackers to cause a denial of service (panic) via a large IPv6 UDP packet, as demonstrated by use of the Token Bucket Filter (TBF) queueing discipline.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0e033e04c2678dbbe74a46b23fffb7bb918c288e
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html
- http://www.openwall.com/lists/oss-security/2013/11/13/9
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1030015
- https://github.com/torvalds/linux/commit/0e033e04c2678dbbe74a46b23fffb7bb918c288e
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0e033e04c2678dbbe74a46b23fffb7bb918c288e
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html
- http://www.openwall.com/lists/oss-security/2013/11/13/9
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1030015
- https://github.com/torvalds/linux/commit/0e033e04c2678dbbe74a46b23fffb7bb918c288e
Modified: 2025-04-11
CVE-2013-6432
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cf970c002d270c36202bd5b9c2804d3097a52da0
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/06/6
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039046
- https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cf970c002d270c36202bd5b9c2804d3097a52da0
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/06/6
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039046
- https://github.com/torvalds/linux/commit/cf970c002d270c36202bd5b9c2804d3097a52da0
Modified: 2025-04-11
CVE-2013-7263
The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2014-0159.html
- http://rhn.redhat.com/errata/RHSA-2014-0285.html
- http://seclists.org/oss-sec/2014/q1/29
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/11/28/13
- http://www.ubuntu.com/usn/USN-2107-1
- http://www.ubuntu.com/usn/USN-2108-1
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2014-0159.html
- http://rhn.redhat.com/errata/RHSA-2014-0285.html
- http://seclists.org/oss-sec/2014/q1/29
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/11/28/13
- http://www.ubuntu.com/usn/USN-2107-1
- http://www.ubuntu.com/usn/USN-2108-1
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
Modified: 2025-04-11
CVE-2013-7264
The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
- http://seclists.org/oss-sec/2014/q1/29
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/11/28/13
- http://www.ubuntu.com/usn/USN-2107-1
- http://www.ubuntu.com/usn/USN-2108-1
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
- http://seclists.org/oss-sec/2014/q1/29
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/11/28/13
- http://www.ubuntu.com/usn/USN-2107-1
- http://www.ubuntu.com/usn/USN-2108-1
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
Modified: 2025-04-11
CVE-2013-7265
The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
- http://rhn.redhat.com/errata/RHSA-2014-0159.html
- http://seclists.org/oss-sec/2014/q1/29
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/11/28/13
- http://www.ubuntu.com/usn/USN-2107-1
- http://www.ubuntu.com/usn/USN-2108-1
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
- http://rhn.redhat.com/errata/RHSA-2014-0159.html
- http://seclists.org/oss-sec/2014/q1/29
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/11/28/13
- http://www.ubuntu.com/usn/USN-2107-1
- http://www.ubuntu.com/usn/USN-2108-1
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
Modified: 2025-04-11
CVE-2013-7266
The mISDN_sock_recvmsg function in drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does not ensure that a certain length value is consistent with the size of an associated data structure, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2025-04-11
CVE-2013-7267
The atalk_recvmsg function in net/appletalk/ddp.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2025-04-11
CVE-2013-7268
The ipx_recvmsg function in net/ipx/af_ipx.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2025-04-11
CVE-2013-7269
The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.securityfocus.com/bid/64742
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90130
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.securityfocus.com/bid/64742
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90130
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2025-04-11
CVE-2013-7270
The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.securityfocus.com/bid/64744
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90131
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.securityfocus.com/bid/64744
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90131
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2025-04-11
CVE-2013-7271
The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.securityfocus.com/bid/64746
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90132
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
- http://secunia.com/advisories/55882
- http://secunia.com/advisories/56036
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/12/31/7
- http://www.securityfocus.com/bid/64746
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2128-1
- http://www.ubuntu.com/usn/USN-2129-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1039845
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90132
- https://github.com/torvalds/linux/commit/f3d3342602f8bcbf37d7c46641cb9bca7618eb1c
Modified: 2025-04-11
CVE-2013-7281
The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/11/28/13
- http://www.securityfocus.com/bid/64747
- http://www.securitytracker.com/id/1029566
- http://www.ubuntu.com/usn/USN-2107-1
- http://www.ubuntu.com/usn/USN-2108-1
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90222
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2013/11/28/13
- http://www.securityfocus.com/bid/64747
- http://www.securitytracker.com/id/1029566
- http://www.ubuntu.com/usn/USN-2107-1
- http://www.ubuntu.com/usn/USN-2108-1
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1035875
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90222
- https://github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69
Modified: 2025-04-12
CVE-2013-7348
Double free vulnerability in the ioctx_alloc function in fs/aio.c in the Linux kernel before 3.12.4 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via vectors involving an error condition in the aio_setup_ring function.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d558023207e008a4476a3b7bb8706b2a2bf5d84f
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2014/03/31/10
- https://github.com/torvalds/linux/commit/d558023207e008a4476a3b7bb8706b2a2bf5d84f
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d558023207e008a4476a3b7bb8706b2a2bf5d84f
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
- http://www.openwall.com/lists/oss-security/2014/03/31/10
- https://github.com/torvalds/linux/commit/d558023207e008a4476a3b7bb8706b2a2bf5d84f
Closed vulnerabilities
Modified: 2021-03-29
BDU:2015-00382
Уязвимость программного обеспечения Samba, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-29
BDU:2015-00390
Уязвимость программного обеспечения Samba, позволяющая удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации
Modified: 2016-11-28
BDU:2015-06049
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-08932
Уязвимости операционной системы CentOS, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2012-6150
The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
- http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html
- http://marc.info/?l=bugtraq&m=141660010015249&w=2
- http://openwall.com/lists/oss-security/2013/12/03/5
- http://rhn.redhat.com/errata/RHSA-2014-0330.html
- http://security.gentoo.org/glsa/glsa-201502-15.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:299
- http://www.ubuntu.com/usn/USN-2054-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1036897
- https://bugzilla.samba.org/show_bug.cgi?id=10300
- https://lists.samba.org/archive/samba-technical/2012-June/084593.html
- https://lists.samba.org/archive/samba-technical/2013-November/096411.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
- http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html
- http://marc.info/?l=bugtraq&m=141660010015249&w=2
- http://openwall.com/lists/oss-security/2013/12/03/5
- http://rhn.redhat.com/errata/RHSA-2014-0330.html
- http://security.gentoo.org/glsa/glsa-201502-15.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:299
- http://www.ubuntu.com/usn/USN-2054-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1036897
- https://bugzilla.samba.org/show_bug.cgi?id=10300
- https://lists.samba.org/archive/samba-technical/2012-June/084593.html
- https://lists.samba.org/archive/samba-technical/2013-November/096411.html
Modified: 2025-04-11
CVE-2013-4408
Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
- http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html
- http://marc.info/?l=bugtraq&m=141660010015249&w=2
- http://rhn.redhat.com/errata/RHSA-2013-1805.html
- http://rhn.redhat.com/errata/RHSA-2013-1806.html
- http://rhn.redhat.com/errata/RHSA-2014-0009.html
- http://security.gentoo.org/glsa/glsa-201502-15.xml
- http://www.debian.org/security/2013/dsa-2812
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:299
- http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch
- http://www.samba.org/samba/security/CVE-2013-4408
- http://www.securityfocus.com/bid/64191
- http://www.ubuntu.com/usn/USN-2054-1
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
- http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html
- http://marc.info/?l=bugtraq&m=141660010015249&w=2
- http://rhn.redhat.com/errata/RHSA-2013-1805.html
- http://rhn.redhat.com/errata/RHSA-2013-1806.html
- http://rhn.redhat.com/errata/RHSA-2014-0009.html
- http://security.gentoo.org/glsa/glsa-201502-15.xml
- http://www.debian.org/security/2013/dsa-2812
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:299
- http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch
- http://www.samba.org/samba/security/CVE-2013-4408
- http://www.securityfocus.com/bid/64191
- http://www.ubuntu.com/usn/USN-2054-1