Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 492530 (CVE-2013-6381) - Kernel : qeth: buffer overflow in snmp ioctl (CVE-2013-6381)
Summary: Kernel : qeth: buffer overflow in snmp ioctl (CVE-2013-6381)
Status: RESOLVED FIXED
Alias: CVE-2013-6381
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-25 19:49 UTC by Agostino Sarubbo
Modified: 2022-03-25 16:40 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-11-25 19:49:15 UTC
From ${URL} :

Linux kernel built with a Gigabit Ethernet device support(CONFIG_QETH) is
vulnerable to a buffer overflow flaw. It could occur while doing an
ioctl(SIOC_QETH_ADP_SET_SNMP_CONTROL) call.

A user/program could use this flaw to crash the kernel resulting in DoS or 
potentially escalate user privileges on a system.

Upstream fix:
-------------
 -> http://git.kernel.org/linus/6fb392b1a63ae36c31f62bc3fc8630b49d602b62

Reference:
----------
 -> http://seclists.org/oss-sec/2013/q4/330
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-11-27 21:50:26 UTC
CVE-2013-6381 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6381):
  Buffer overflow in the qeth_snmp_command function in
  drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows
  local users to cause a denial of service or possibly have unspecified other
  impact via an SNMP ioctl call with a length value that is incompatible with
  the command-buffer size.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 16:40:01 UTC
Fix in 3.12.3