|
|
Subscribe / Log in / New account

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2013-1763
Created:February 26, 2013 Updated:March 22, 2013
Description: Mathias Krause discovered a bounds checking error for netlink messages requesting SOCK_DIAG_BY_FAMILY. An unprivileged local user could exploit this flaw to crash the system or run programs as an administrator. This patch fixes the problem.
Alerts:
Mandriva MDVSA-2013:176 kernel 2013-06-24
openSUSE openSUSE-SU-2013:0824-1 kernel 2013-05-24
Fedora FEDORA-2013-3909 kernel 2013-03-22
Red Hat RHSA-2013:0622-01 kernel-rt 2013-03-11
openSUSE openSUSE-SU-2013:0395-1 kernel 2013-03-05
Fedora FEDORA-2013-3106 kernel 2013-03-02
Fedora FEDORA-2013-3223 kernel 2013-03-02
Mageia MGASA-2013-0083 kernel-rt 2013-03-02
Mageia MGASA-2013-0082 kernel-vserver 2013-03-02
Mageia MGASA-2013-0081 kernel-linus 2013-03-02
Mageia MGASA-2013-0080 kernel-tmb 2013-03-02
Mageia MGASA-2013-0079 kernel 2013-03-02
Ubuntu USN-1751-1 linux-ti-omap4 2013-02-26
Ubuntu USN-1750-1 linux 2013-02-26
Fedora FEDORA-2013-3086 kernel 2013-02-27
Ubuntu USN-1749-1 linux-lts-quantal 2013-02-26

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds