Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 492534 (CVE-2013-6380)

Summary: Kernel : aacraid: invalid pointer dereference (CVE-2013-6380)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED FIXED    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1033593
Whiteboard:
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2013-11-25 19:50:11 UTC
From ${URL} :

Linux kernel built with a Adaptec RAID controllers support(CONFIG_SCSI_AACRAID)
is vulnerable to a invalid pointer dereference flaw. It could occur while doing an ioctl(2) call 
with a FSACTL_SEND_RAW_SRB command. A user would need to have
CAP_SYS_ADMIN privileges to perform such call.

A privileged(CAP_SYS_ADMIN) user/program could use this flaw to crash the kernel
resulting in DoS.

Upstream fix:
-------------
  -> https://git.kernel.org/linus/b4789b8e6be3151a955ade74872822f30e8cd914

Reference:
----------
 -> http://seclists.org/oss-sec/2013/q4/330
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-11-27 21:44:29 UTC
CVE-2013-6380 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6380):
  The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the
  Linux kernel through 3.12.1 does not properly validate a certain size value,
  which allows local users to cause a denial of service (invalid pointer
  dereference) or possibly have unspecified other impact via an
  FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 16:40:50 UTC
Fix in 3.12.2 onwards