Bug 805633 (CVE-2013-1763) - VUL-0: CVE-2013-1763: kernel: local privilege escalation via sock_diag netlink socket
Summary: VUL-0: CVE-2013-1763: kernel: local privilege escalation via sock_diag netlin...
Status: RESOLVED FIXED
: 806351 (view as bug list)
Alias: CVE-2013-1763
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Critical
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-02-25 09:39 UTC by Marcus Meissner
Modified: 2015-02-19 01:18 UTC (History)
6 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2013-02-25 09:39:08 UTC
is public, via oss-security

CVE-2013-1763

Date: Sun, 24 Feb 2013 10:10:45 +0100
From: Mathias Krause <minipli@googlemail.com>
Subject: [oss-security] CVE Request: kernel - sock_diag: Fix out-of-bounds access to sock_diag_handlers[]

An unprivileged user can send a netlink message resulting in an
out-of-bounds access of the sock_diag_handlers[] array which, in turn,
allows userland to take over control while in kernel mode.

Patch (already in net/master):
http://thread.gmane.org/gmane.linux.network/260061

Affected versions:
v3.3 - v3.8
Comment 1 Marcus Meissner 2013-02-25 12:53:38 UTC
should fix this in 12.3 before shipment i wpould say
Comment 2 Swamp Workflow Management 2013-02-25 23:00:15 UTC
bugbot adjusting priority
Comment 3 Jeff Mahoney 2013-02-26 03:35:42 UTC
Fixes checked in for openSUSE 12.2 and openSUSE 12.3.
Comment 4 Marcus Meissner 2013-02-27 08:04:27 UTC
*** Bug 806351 has been marked as a duplicate of this bug. ***
Comment 5 Swamp Workflow Management 2013-03-05 16:05:48 UTC
openSUSE-SU-2013:0395-1: An update that solves 5 vulnerabilities and has three fixes is now available.

Category: security (important)
Bug References: 797175,799209,800280,801178,801782,802153,804738,805633
CVE References: CVE-2012-5374,CVE-2013-0160,CVE-2013-0216,CVE-2013-0231,CVE-2013-1763
Sources used:
openSUSE 12.2 (src):    kernel-docs-3.4.33-2.24.2, kernel-source-3.4.33-2.24.1, kernel-syms-3.4.33-2.24.1
Comment 6 Tobias Burnus 2013-03-08 10:24:57 UTC
Would it be possible to also update openSUSE factory [1]? Both kernel:openSUSE-12.3 [2] / and kernel:HEAD [2] have the patch.

It would be nice if someone could request an update of Factory, who has an idea how stable the current kernel:{HEAD,openSUSE-12.3} are.

[1] https://build.opensuse.org/package/show?package=kernel-source&project=openSUSE%3AFactory
[2] https://build.opensuse.org/package/show?package=kernel-source&project=Kernel%3AopenSUSE-12.3
[3] https://build.opensuse.org/package/show?package=kernel-source&project=Kernel%3AHEAD
Comment 7 Stephan Kulow 2013-03-08 10:36:28 UTC
I already mailed opensuse-kernel mailing list for them to push 3.8
Comment 8 Marcus Meissner 2013-03-13 12:05:38 UTC
released otherwise.
Comment 9 Tobias Burnus 2013-03-13 13:16:17 UTC
(In reply to comment #8)
> released otherwise.

But seemingly still not for openSUSE Factory.

At least, I do not see an update or a request:
https://build.opensuse.org/package/show?package=kernel-source&project=openSUSE%3AFactory
Comment 10 Swamp Workflow Management 2013-05-24 15:05:04 UTC
openSUSE-SU-2013:0824-1: An update that solves 8 vulnerabilities and has three fixes is now available.

Category: security (moderate)
Bug References: 792500,802153,805633,806138,806976,806980,808829,809155,809330,809748,813963
CVE References: CVE-2013-0913,CVE-2013-1763,CVE-2013-1767,CVE-2013-1774,CVE-2013-1796,CVE-2013-1797,CVE-2013-1798,CVE-2013-1848
Sources used:
openSUSE 12.2 (src):    kernel-docs-3.4.42-2.28.2, kernel-source-3.4.42-2.28.1, kernel-syms-3.4.42-2.28.1
Comment 11 Marcus Meissner 2014-09-18 11:38:01 UTC
example code in https://github.com/jirislaby/exploit-talk