[packages/kernel] - local root exploit fix (CVE-2013-1763)
arekm
arekm at pld-linux.org
Wed Feb 27 09:01:45 CET 2013
commit 1f4141ff17511fe2e5a35c0180a9321d1c775f47
Author: Arkadiusz Miśkiewicz <arekm at maven.pl>
Date: Wed Feb 27 09:01:40 2013 +0100
- local root exploit fix (CVE-2013-1763)
kernel-small_fixes.patch | 30 ++++++++++++++++++++++++++++++
1 file changed, 30 insertions(+)
---
diff --git a/kernel-small_fixes.patch b/kernel-small_fixes.patch
index 2c20420..0660f7e 100644
--- a/kernel-small_fixes.patch
+++ b/kernel-small_fixes.patch
@@ -50,3 +50,33 @@ index 7a0c800..ec5ebbb 100644
1.7.7.3
+commit 6e601a53566d84e1ffd25e7b6fe0b6894ffd79c0
+Author: Mathias Krause <minipli at googlemail.com>
+Date: Sat Feb 23 01:13:47 2013 +0000
+
+ sock_diag: Fix out-of-bounds access to sock_diag_handlers[]
+
+ Userland can send a netlink message requesting SOCK_DIAG_BY_FAMILY
+ with a family greater or equal then AF_MAX -- the array size of
+ sock_diag_handlers[]. The current code does not test for this
+ condition therefore is vulnerable to an out-of-bound access opening
+ doors for a privilege escalation.
+
+ Signed-off-by: Mathias Krause <minipli at googlemail.com>
+ Acked-by: Eric Dumazet <edumazet at google.com>
+ Signed-off-by: David S. Miller <davem at davemloft.net>
+
+diff --git a/net/core/sock_diag.c b/net/core/sock_diag.c
+index 602cd63..750f44f 100644
+--- a/net/core/sock_diag.c
++++ b/net/core/sock_diag.c
+@@ -121,6 +121,9 @@ static int __sock_diag_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
+ if (nlmsg_len(nlh) < sizeof(*req))
+ return -EINVAL;
+
++ if (req->sdiag_family >= AF_MAX)
++ return -EINVAL;
++
+ hndl = sock_diag_lock_handler(req->sdiag_family);
+ if (hndl == NULL)
+ err = -ENOENT;
================================================================
---- gitweb:
http://git.pld-linux.org/gitweb.cgi/packages/kernel.git/commitdiff/1f4141ff17511fe2e5a35c0180a9321d1c775f47
More information about the pld-cvs-commit
mailing list