CVE-2013-2852
Published: 7 June 2013
Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
From the Ubuntu security team
Kees Cook discovered a format string vulnerability in the Broadcom B43 wireless driver for the Linux kernel. A local user could exploit this flaw to gain administrative privileges.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-armadaxp Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-aws Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-ec2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-flo Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-gke Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-goldfish Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-grouper Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-hwe Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-lts-raring Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-lts-wily Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-maguro Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-mako Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-manta Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-raspi2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-snapdragon Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.10~rc6)
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2852
- https://bugzilla.redhat.com/show_bug.cgi?id=969518
- http://www.openwall.com/lists/oss-security/2013/06/06/13
- http://git.kernel.org/cgit/linux/kernel/git/linville/wireless.git/commit/?id=9538cbaab6e8b8046039b4b2eb6c9d614dc782bd
- https://ubuntu.com/security/notices/USN-1899-1
- https://ubuntu.com/security/notices/USN-1900-1
- https://ubuntu.com/security/notices/USN-1918-1
- https://ubuntu.com/security/notices/USN-1919-1
- https://ubuntu.com/security/notices/USN-1915-1
- https://ubuntu.com/security/notices/USN-1916-1
- https://ubuntu.com/security/notices/USN-1914-1
- https://ubuntu.com/security/notices/USN-1917-1
- https://ubuntu.com/security/notices/USN-1920-1
- https://ubuntu.com/security/notices/USN-1930-1
- https://ubuntu.com/security/notices/USN-1936-1
- NVD
- Launchpad
- Debian