From ${URL} : Linux kernel built with a Adaptec RAID controllers support(CONFIG_SCSI_AACRAID) is vulnerable to a invalid pointer dereference flaw. It could occur while doing an ioctl(2) call with a FSACTL_SEND_RAW_SRB command. A user would need to have CAP_SYS_ADMIN privileges to perform such call. A privileged(CAP_SYS_ADMIN) user/program could use this flaw to crash the kernel resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/b4789b8e6be3151a955ade74872822f30e8cd914 Reference: ---------- -> http://seclists.org/oss-sec/2013/q4/330
CVE-2013-6380 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6380): The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command.
Fix in 3.12.2 onwards