CVE-2013-4299

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

6.0medium2.0
0246810

CVSS Score: 6.0/10

All CVSS Scores

CVSS 2.0
6.0

Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Description

Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-200

Recommendations

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
To install kernel packages manually, use “rpm -ivh [package]”. Do not use”rpm -Uvh” as that will remove the running kernel binaries from yoursystem. You may use “rpm -e” to remove old kernels after determining thatthe new kernel functions properly on your system.

URL: http://rhn.redhat.com/errata/RHSA-2013-1860.html

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
To install kernel packages manually, use “rpm -ivh [package]”. Do not use”rpm -Uvh” as that will remove the running kernel binaries from yoursystem. You may use “rpm -e” to remove old kernels after determining thatthe new kernel functions properly on your system.

URL: http://rhn.redhat.com/errata/RHSA-2013-1783.html

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
Details on how to use the Red Hat Network to apply this update areavailable at https://access.redhat.com/site/articles/11258
This Red Hat OpenStack 3.0 kernel may be installed by running this commandwhile logged in as the root user on a system that has the requiredentitlements and subscriptions attached:

yum install “kernel-2.6.*.openstack.el6.x86_64”

Documentation for both stable and preview releases of Red Hat OpenStack isavailable at:
https://access.redhat.com/site/documentation/Red_Hat_OpenStack/
In particular it is highly recommended that all users read the ReleaseNotes document for the relevant Red Hat OpenStack release prior toinstallation.

URL: http://rhn.redhat.com/errata/RHSA-2013-1520.html

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
To install kernel packages manually, use “rpm -ivh [package]”. Do not use”rpm -Uvh” as that will remove the running kernel binaries from yoursystem. You may use “rpm -e” to remove old kernels after determining thatthe new kernel functions properly on your system.

URL: http://rhn.redhat.com/errata/RHSA-2013-1519.html

Source: nvd

This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
To upgrade Hypervisors in Red Hat Enterprise Virtualization environmentsusing the disk image provided by this package, refer to:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html

URL: http://rhn.redhat.com/errata/RHSA-2013-1460.html

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
To install kernel packages manually, use “rpm -ivh [package]”. Do not use”rpm -Uvh” as that will remove the running kernel binaries from yoursystem. You may use “rpm -e” to remove old kernels after determining thatthe new kernel functions properly on your system.

URL: http://rhn.redhat.com/errata/RHSA-2013-1450.html

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
To install kernel packages manually, use “rpm -ivh [package]”. Do not use”rpm -Uvh” as that will remove the running kernel binaries from yoursystem. You may use “rpm -e” to remove old kernels after determining thatthe new kernel functions properly on your system.

URL: http://rhn.redhat.com/errata/RHSA-2013-1449.html

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
To install kernel packages manually, use “rpm -ivh [package]”. Do not use”rpm -Uvh” as that will remove the running kernel binaries from yoursystem. You may use “rpm -e” to remove old kernels after determining thatthe new kernel functions properly on your system.

URL: http://rhn.redhat.com/errata/RHSA-2013-1436.html

Vulnerable Software (54)

Type: Configuration

Product: linux

Operating System: debian wheezy 7

Trait:
{  "fixed": "3.2.53-1"}

Source: debian

Type: Configuration

Product: linux

Operating System: ubuntu utopic 14.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu vivid 15.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu wily 15.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu yakkety 16.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: ubuntu zesty 17.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux

Operating System: debian

Trait:
{  "fixed": "3.11.6-2"}

Source: debian

Type: Configuration

Product: linux

Operating System: ubuntu trusty 14.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: linux-2.6

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian