Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 491370 (CVE-2013-4588) - Kernel : net: ipvs: stack buffer overflow (CVE-2013-4588)
Summary: Kernel : net: ipvs: stack buffer overflow (CVE-2013-4588)
Status: RESOLVED FIXED
Alias: CVE-2013-4588
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-15 20:13 UTC by Agostino Sarubbo
Modified: 2022-03-25 15:45 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-11-15 20:13:10 UTC
From ${URL} :

Linux kernel built with the IP Virtual Server(CONFIG_IP_VS) support is
vulnerable to a buffer overflow flaw. It could occur while setting or
retrieving socket options via setsockopt(2) or getsockopt(2) calls.
Though a user needs to have CAP_NET_ADMIN privileges to perform these IP_VS
operations.

A user/program with CAP_NET_ADMIN privileges could use this flaw to further escalate their 
privileges on a system.

Upstream fix:
-------------
 -> https://git.kernel.org/linus/04bcef2a83f40c6db24222b27a52892cba39dffb
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-11-27 21:51:33 UTC
CVE-2013-4588 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4588):
  Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in
  the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users
  to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a
  getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a
  setsockopt system call, related to the do_ip_vs_set_ctl function.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 15:45:07 UTC
Fix in 2.6.33