Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 465424 (CVE-2013-1929) - Kernel : tg3: buffer overflow in VPD firmware parsing (CVE-2013-1929)
Summary: Kernel : tg3: buffer overflow in VPD firmware parsing (CVE-2013-1929)
Status: CONFIRMED
Alias: CVE-2013-1929
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-04-10 18:20 UTC by Agostino Sarubbo
Modified: 2016-12-07 04:16 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-04-10 18:20:18 UTC
From ${URL} :

Linux kernel built with the Broadcom tg3 ethernet driver is vulnerable to a
buffer overflow. This could occur when the tg3 driver reads and copies firmware 
string from hardware's product data(VPD), if it exceeds 32 characters.

A user with physical access to a machine could use this flaw to crash the
system or, potentially, escalate their privileges on the system.

Upstream fix:
-------------
 -> https://git.kernel.org/linus/715230a44310a8cf66fbfb5a46f9a62a9b2de424

Reference:
----------
 -> http://openwall.com/lists/oss-security/2013/04/05/2
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-08-30 01:41:24 UTC
CVE-2013-1929 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1929):
  Heap-based buffer overflow in the tg3_read_vpd function in
  drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows
  physically proximate attackers to cause a denial of service (system crash)
  or possibly execute arbitrary code via crafted firmware that specifies a
  long string in the Vital Product Data (VPD) data structure.