Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 459532 (CVE-2013-1773)

Summary: Kernel : VFAT slab-based buffer overflow (CVE-2013-1773)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED OBSOLETE    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=916115
Whiteboard:
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2013-02-27 13:47:10 UTC
From $URL :

Linux kernel built with support to VFAT file system is vulnerable to a buffer
overflow flaw which happens when converting UTF8 character string to UTF16
via function: utf8s_to_utf16s.

An unprivileged user could use this flaw to crash the kernel causing DoS or potentially escalate 
privileges.

Upstream fix:
 -> https://git.kernel.org/linus/0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd

Reference:
 -> http://www.openwall.com/lists/oss-security/2013/02/26/5
 -> http://www.exploit-db.com/exploits/23248/
Comment 1 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2018-04-04 19:13:13 UTC
There are no longer any 2.x or <3.3 kernels available in the repository with
the exception of sys-kernel/xbox-sources which is unsupported by security.