Bug 1034490 (CVE-2013-2596)

Summary: CVE-2013-2596 kernel: integer overflow in fb_mmap
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: agordeev, aquini, bhu, dhoward, esammons, fhrbata, fweimer, gansalmon, iboverma, itamar, jforbes, jkacur, jkurik, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, lgoncalv, lwang, madhu.chinakonda, matt, mchehab, mcressma, mguzik, nmurray, nobody, pholasek, plougher, pmatouse, ppandit, rt-maint, rvrbovsk, vdronov, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-03-15 15:53:00 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1035239, 1035240, 1035241, 1035242, 1196302, 1196303    
Bug Blocks: 1034422    

Description Vincent Danen 2013-11-25 23:31:20 UTC
Linux kernel built with the Frame Buffer devices support(CONFIG_FB) is
vulnerable to an integer overflow flaw. It could occur while mapping memory via
mmap2(2) call. User would need to have privileges to access the video device files /dev/fb* etc.

A user/program able to access the video device files could use this flaw to potentially escalate privileges on a system.

Upstream fix:
-------------
  -> https://git.kernel.org/linus/b4cbb197c7e7a68dbad0d491242e3ca67420c13e
  -> https://git.kernel.org/linus/fc9bbca8f650e5f738af8806317c0a041a48ae4a

References:
-----------
  -> http://forum.xda-developers.com/showthread.php?t=2255491
  -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2596

Comment 1 Prasad Pandit 2013-11-27 07:25:04 UTC
Statement:

This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise MRG 2.

This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5. Future kernel updates for Red Hat Enterprise Linux 5 may address this issue.

Comment 4 Martin Prpič 2014-10-10 08:44:56 UTC
IssueDescription:

An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system.

Comment 5 errata-xmlrpc 2014-10-14 05:38:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:1392 https://rhn.redhat.com/errata/RHSA-2014-1392.html

Comment 8 errata-xmlrpc 2015-03-17 14:39:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 AUS

Via RHSA-2015:0695 https://rhn.redhat.com/errata/RHSA-2015-0695.html

Comment 9 errata-xmlrpc 2015-04-07 15:12:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.5 EUS - Server and Compute Node Only

Via RHSA-2015:0782 https://rhn.redhat.com/errata/RHSA-2015-0782.html

Comment 10 errata-xmlrpc 2015-04-14 13:09:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.4 AUS - Server Only

Via RHSA-2015:0803 https://rhn.redhat.com/errata/RHSA-2015-0803.html

Comment 11 errata-xmlrpc 2016-03-15 14:47:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2016:0450 https://rhn.redhat.com/errata/RHSA-2016-0450.html