Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 15 Nov 2013 06:49:41 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: Linux kernel: net: ipvs stack buffer
 overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/15/2013 01:42 AM, P J P wrote:
> Hello,
> 
> Linux kernel built with the IP Virtual Server(CONFIG_IP_VS) support
> is vulnerable to a buffer overflow flaw. It could occur while
> setting or retrieving socket options via setsockopt(2) or
> getsockopt(2) calls. Though a user needs to have CAP_NET_ADMIN
> privileges to perform these IP_VS operations.
> 
> A user/program with CAP_NET_ADMIN privileges could use this flaw
> to further escalate their privileges on a system.
> 
> Upstream fix: ------------- ->
> https://git.kernel.org/linus/04bcef2a83f40c6db24222b27a52892cba39dffb
>
>  References: ----------- ->
> http://seclists.org/fulldisclosure/2013/Nov/77 ->
> https://bugzilla.redhat.com/show_bug.cgi?id=1030800
> 
> 
> Thank you. -- Prasad J Pandit / Red Hat Security Response Team

Please use CVE-2013-4588 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=DtLs
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ