Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
References
Link | Resource |
---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fb392b1a63ae36c31f62bc3fc8630b49d602b62 | Broken Link |
http://rhn.redhat.com/errata/RHSA-2014-0159.html | Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2014-0284.html | Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2014-0285.html | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2013/11/22/5 | Mailing List |
http://www.securityfocus.com/bid/63890 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1033600 | Issue Tracking |
https://github.com/torvalds/linux/commit/6fb392b1a63ae36c31f62bc3fc8630b49d602b62 | Exploit Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2013-11-27 04:43
Updated : 2024-04-26 16:10
NVD link : CVE-2013-6381
Mitre link : CVE-2013-6381
CVE.ORG link : CVE-2013-6381
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer