![]() |
|
Message-ID: <alpine.LFD.2.10.1311151408030.26561@wniryva.cad.erqung.pbz> Date: Fri, 15 Nov 2013 14:12:52 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> Subject: CVE request: Linux kernel: net: ipvs stack buffer overflow Hello, Linux kernel built with the IP Virtual Server(CONFIG_IP_VS) support is vulnerable to a buffer overflow flaw. It could occur while setting or retrieving socket options via setsockopt(2) or getsockopt(2) calls. Though a user needs to have CAP_NET_ADMIN privileges to perform these IP_VS operations. A user/program with CAP_NET_ADMIN privileges could use this flaw to further escalate their privileges on a system. Upstream fix: ------------- -> https://git.kernel.org/linus/04bcef2a83f40c6db24222b27a52892cba39dffb References: ----------- -> http://seclists.org/fulldisclosure/2013/Nov/77 -> https://bugzilla.redhat.com/show_bug.cgi?id=1030800 Thank you. -- Prasad J Pandit / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.