6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
kernel-rt is vulnerable to privilege escalation. A buffer overflow flaw was found in the way UTF-8 characters were converted to UTF-16 in the utf8s_to_utf16s() function of the Linux kernel’s FAT file system implementation. A local user able to mount a FAT file system with the “utf8=1” option could use this flaw to crash the system or, potentially, to escalate their privileges.
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd
rhn.redhat.com/errata/RHSA-2013-0744.html
rhn.redhat.com/errata/RHSA-2013-0928.html
rhn.redhat.com/errata/RHSA-2013-1026.html
www.exploit-db.com/exploits/23248/
www.kernel.org/pub/linux/kernel/v3.x/patch-3.3.bz2
www.openwall.com/lists/oss-security/2013/02/26/8
www.osvdb.org/88310
www.securityfocus.com/bid/58200
access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/RHSA-2013-0566.html
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=773017
bugzilla.redhat.com/show_bug.cgi?id=866596
bugzilla.redhat.com/show_bug.cgi?id=866600
bugzilla.redhat.com/show_bug.cgi?id=916115
github.com/torvalds/linux/commit/0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd
rhn.redhat.com/errata/RHSA-2012-0333.html
rhn.redhat.com/errata/RHSA-2013-0566.html