Upstream information

CVE-2013-0313 at MITRE


The evm_update_evmxattr function in security/integrity/evm/evm_crypto.c in the Linux kernel before 3.7.5, when the Extended Verification Module (EVM) is enabled, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an attempted removexattr operation on an inode of a sockfs filesystem.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.2
Vector AV:L/AC:H/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Note from the SUSE Security Team

The EVM feature was introduced in Linux kernel 3.2 and did not exist in older versions. So SUSE Linux Enterprise Server 11 and older products are not affected by the security problem.

SUSE Bugzilla entry: 804903 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.