CVE-2013-4588 (retired)

Priority
Description
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in
the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local
users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1)
a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2)
a setsockopt system call, related to the do_ip_vs_set_ctl function.
A user/program with CAP_NET_ADMIN privileges could use this flaw to
further escalate their privileges on a system.
Ubuntu-Description
A flaw was discovered in the Linux kernel's IP Virtual Server (IP_VS)
support. A local user with the CAP_NET_ADMIN capability could exploit this
flaw to gain additional administrative privileges.
Notes
sarnoldLooks like the flaw was introduced before the start of git.
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.33~rc4)
Patches:
Introduced by
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by
04bcef2a83f40c6db24222b27a52892cba39dffb
Package
Upstream:released (2.6.33~rc4)
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (2.6.33~rc4)
Package
Upstream:released (2.6.33~rc4)
Package
Upstream:released (2.6.33~rc4)
Package
Upstream:released (2.6.33~rc4)
Package
Upstream:released (2.6.33~rc4)
Package
Upstream:released (2.6.33~rc4)
Patches:
Package
Upstream:released (2.6.33~rc4)
Package
Upstream:released (2.6.33~rc4)
Package
Upstream:released (2.6.33~rc4)
Package
Upstream:released (2.6.33~rc4)
Package
Upstream:released (2.6.33~rc4)
More Information

Updated: 2019-10-09 07:48:28 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)