Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <52862675.3090609@redhat.com>
Date: Fri, 15 Nov 2013 06:49:41 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: Linux kernel: net: ipvs stack buffer
 overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/15/2013 01:42 AM, P J P wrote:
> Hello,
> 
> Linux kernel built with the IP Virtual Server(CONFIG_IP_VS) support
> is vulnerable to a buffer overflow flaw. It could occur while
> setting or retrieving socket options via setsockopt(2) or
> getsockopt(2) calls. Though a user needs to have CAP_NET_ADMIN
> privileges to perform these IP_VS operations.
> 
> A user/program with CAP_NET_ADMIN privileges could use this flaw
> to further escalate their privileges on a system.
> 
> Upstream fix: ------------- ->
> https://git.kernel.org/linus/04bcef2a83f40c6db24222b27a52892cba39dffb
>
>  References: ----------- ->
> http://seclists.org/fulldisclosure/2013/Nov/77 ->
> https://bugzilla.redhat.com/show_bug.cgi?id=1030800
> 
> 
> Thank you. -- Prasad J Pandit / Red Hat Security Response Team

Please use CVE-2013-4588 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=DtLs
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.