RSS

 Seguime por RSS

27 feb. 2013

Linux Kernel 3.7.10 corrige bug CVE-2013-1763

El nuevo kernel 3.7.10 corrige el bug de netlink CVE-2013-1763 local root exploit.
El nuevo kernel 3.7.10 corrige el bug del CVE mencionado, y puede verse en el changelog:

commit 314561f4fe77ffad1b560a10cdfb3b6fdc731a74
Author: Mathias Krause <minipli@googlemail.com>
Date:   Sat Feb 23 01:13:47 2013 +0000

    sock_diag: Fix out-of-bounds access to sock_diag_handlers[]
    
    [ Upstream commit 6e601a53566d84e1ffd25e7b6fe0b6894ffd79c0 ]
    
    Userland can send a netlink message requesting SOCK_DIAG_BY_FAMILY
    with a family greater or equal then AF_MAX -- the array size of
    sock_diag_handlers[]. The current code does not test for this
    condition therefore is vulnerable to an out-of-bound access opening
    doors for a privilege escalation.
    
    Signed-off-by: Mathias Krause <minipli@googlemail.com>
    Acked-by: Eric Dumazet <edumazet@google.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

No hay comentarios:

Publicar un comentario en la entrada

Ingresa tu comentario