Bug 1034490 (CVE-2013-2596) - CVE-2013-2596 kernel: integer overflow in fb_mmap
Summary: CVE-2013-2596 kernel: integer overflow in fb_mmap
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-2596
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20130409,repo...
Depends On: 1035239 1035240 1035241 1035242 1196302 1196303
Blocks: 1034422
TreeView+ depends on / blocked
 
Reported: 2013-11-25 23:31 UTC by Vincent Danen
Modified: 2019-06-08 19:48 UTC (History)
35 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system.
Clone Of:
Environment:
Last Closed: 2016-03-15 15:53:00 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1392 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2014-10-14 01:28:44 UTC
Red Hat Product Errata RHSA-2015:0695 normal SHIPPED_LIVE Important: kernel security and bug fix update 2015-03-17 18:39:19 UTC
Red Hat Product Errata RHSA-2015:0782 normal SHIPPED_LIVE Important: kernel security and bug fix update 2015-04-07 19:08:32 UTC
Red Hat Product Errata RHSA-2015:0803 normal SHIPPED_LIVE Important: kernel security and bug fix update 2015-04-14 17:00:51 UTC
Red Hat Product Errata RHSA-2016:0450 normal SHIPPED_LIVE Important: kernel security update 2016-03-15 18:46:44 UTC

Description Vincent Danen 2013-11-25 23:31:20 UTC
Linux kernel built with the Frame Buffer devices support(CONFIG_FB) is
vulnerable to an integer overflow flaw. It could occur while mapping memory via
mmap2(2) call. User would need to have privileges to access the video device files /dev/fb* etc.

A user/program able to access the video device files could use this flaw to potentially escalate privileges on a system.

Upstream fix:
-------------
  -> https://git.kernel.org/linus/b4cbb197c7e7a68dbad0d491242e3ca67420c13e
  -> https://git.kernel.org/linus/fc9bbca8f650e5f738af8806317c0a041a48ae4a

References:
-----------
  -> http://forum.xda-developers.com/showthread.php?t=2255491
  -> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2596

Comment 1 Prasad J Pandit 2013-11-27 07:25:04 UTC
Statement:

This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise MRG 2.

This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5. Future kernel updates for Red Hat Enterprise Linux 5 may address this issue.

Comment 4 Martin Prpič 2014-10-10 08:44:56 UTC
IssueDescription:

An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system.

Comment 5 errata-xmlrpc 2014-10-14 05:38:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:1392 https://rhn.redhat.com/errata/RHSA-2014-1392.html

Comment 8 errata-xmlrpc 2015-03-17 14:39:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.2 AUS

Via RHSA-2015:0695 https://rhn.redhat.com/errata/RHSA-2015-0695.html

Comment 9 errata-xmlrpc 2015-04-07 15:12:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.5 EUS - Server and Compute Node Only

Via RHSA-2015:0782 https://rhn.redhat.com/errata/RHSA-2015-0782.html

Comment 10 errata-xmlrpc 2015-04-14 13:09:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6.4 AUS - Server Only

Via RHSA-2015:0803 https://rhn.redhat.com/errata/RHSA-2015-0803.html

Comment 11 errata-xmlrpc 2016-03-15 14:47:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2016:0450 https://rhn.redhat.com/errata/RHSA-2016-0450.html


Note You need to log in before you can comment on or make changes to this bug.