Bugzilla – Bug 836949
VUL-1: CVE-2013-4270: kernel: open O_WRONLY succeeds on some root owned files in /proc for process running with unprivileged EUID
Last modified: 2016-04-27 20:15:54 UTC
bugbot adjusting priority
CVE-2013-4270 was assigned to this issue.
mainline commit 2433c8f094a008895e66f25bd1773cdb01c91d01 Author: Eric W. Biederman <ebiederm@xmission.com> Date: Sat Oct 5 13:15:30 2013 -0700 net: Update the sysctl permissions handler to test effective uid/gid Modify the code to use current_euid(), and in_egroup_p, as in done in fs/proc/proc_sysctl.c:test_perm() Cc: stable@vger.kernel.org Reviewed-by: Eric Sandeen <sandeen@redhat.com> Reported-by: Eric Sandeen <sandeen@redhat.com> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
SLE11, openSUSE 12.3 and earlier -> doesn't affect openSUSE 13.1 -> 3.11.5 stable kernel already contains the backport SLE12 and later -> 3.12 contains the original fix commit So, we can close this bug. To be sure, I take this back to security-team.
This is fixed. Closing bug.