oss-sec mailing list archives
CVE request: Linux kernel: net: ipvs stack buffer overflow
From: P J P <ppandit () redhat com>
Date: Fri, 15 Nov 2013 14:12:52 +0530 (IST)
Hello,Linux kernel built with the IP Virtual Server(CONFIG_IP_VS) support is vulnerable to a buffer overflow flaw. It could occur while setting or retrieving socket options via setsockopt(2) or getsockopt(2) calls. Though a user needs to have CAP_NET_ADMIN privileges to perform these IP_VS operations.
A user/program with CAP_NET_ADMIN privileges could use this flaw to further escalate their privileges on a system.
Upstream fix: ------------- -> https://git.kernel.org/linus/04bcef2a83f40c6db24222b27a52892cba39dffb References: ----------- -> http://seclists.org/fulldisclosure/2013/Nov/77 -> https://bugzilla.redhat.com/show_bug.cgi?id=1030800 Thank you. -- Prasad J Pandit / Red Hat Security Response Team
Current thread:
- CVE request: Linux kernel: net: ipvs stack buffer overflow P J P (Nov 15)
- Re: CVE request: Linux kernel: net: ipvs stack buffer overflow Kurt Seifried (Nov 15)