LWN.net Logo

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2013-1763
Created:February 26, 2013 Updated:March 22, 2013
Description: Mathias Krause discovered a bounds checking error for netlink messages requesting SOCK_DIAG_BY_FAMILY. An unprivileged local user could exploit this flaw to crash the system or run programs as an administrator. This patch fixes the problem.
Alerts:
Ubuntu USN-1749-1 2013-02-26
Fedora FEDORA-2013-3086 2013-02-27
Ubuntu USN-1750-1 2013-02-26
Ubuntu USN-1751-1 2013-02-26
Mageia MGASA-2013-0079 2013-03-02
Mageia MGASA-2013-0080 2013-03-02
Mageia MGASA-2013-0081 2013-03-02
Mageia MGASA-2013-0082 2013-03-02
Mageia MGASA-2013-0083 2013-03-02
Fedora FEDORA-2013-3223 2013-03-02
Fedora FEDORA-2013-3106 2013-03-02
openSUSE openSUSE-SU-2013:0395-1 2013-03-05
Red Hat RHSA-2013:0622-01 2013-03-11
Fedora FEDORA-2013-3909 2013-03-22

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds