LWN.net Logo

kernel: privilege escalation

Package(s):kernel CVE #(s):CVE-2013-4350 CVE-2013-4343
Created:September 19, 2013 Updated:September 25, 2013
Description: From the Red Hat bugzilla [1; 2]:

Alan Chester reported an issue with IPv6 on SCTP that IPsec traffic is not being encrypted, whereas on IPv4 it is. (CVE-2013-4350)

Linux kernel built with the Universal TUN/TAP device driver(CONFIG_TUN) support is vulnerable to a potential privilege escalation via an use-after-free flaw. It could occur while doing an ioctl(TUNSETIFF) call.

A privileged(CAP_NET_ADMIN) user/program could use this flaw to crash the kernel resulting DoS or potentially escalate privileges to gain root access to a system. (CVE-2013-4343)

Alerts:
Fedora FEDORA-2013-17012 2013-09-19
Fedora FEDORA-2013-17010 2013-09-23

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds