Bug 915052 (CVE-2013-1763)
Summary: | CVE-2013-1763 kernel: sock_diag: out-of-bounds access to sock_diag_handlers[] | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Petr Matousek <pmatouse> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | agordeev, anton, bhu, davej, dhoward, fhrbata, gansalmon, iboverma, itamar, jforbes, jkacur, jneedle, jonathan, jwboyer, kernel-maint, kernel-mgr, lgoncalv, lwang, madhu.chinakonda, mcressma, npajkovs, plougher, rcvalle, rt-maint, rvrbovsk, sforsber, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-08-24 12:37:26 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 915055, 915056, 915057 | ||
Bug Blocks: | 915059 |
Description
Petr Matousek
2013-02-24 13:53:08 UTC
Created kernel tracking bugs for this issue Affects: fedora-all [bug 915057] Statement: This issue did not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and 6. This issue was addressed in Red Hat Enterprise MRG 2 via RHSA-2013:0622 https://rhn.redhat.com/errata/RHSA-2013-0622.html kernel-3.7.9-205.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. kernel-3.7.9-104.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2013:0622 https://rhn.redhat.com/errata/RHSA-2013-0622.html The upstream sha1 is 6e601a53566d84e1ffd25e7b6fe0b6894ffd79c0 |