Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6432

Опубликовано: 09 дек. 2013
Источник: debian
EPSS Низкий

Описание

The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.12.6-1package
linuxnot-affectedwheezypackage
linux-2.6not-affectedpackage

Примечания

  • Introduced by https://git.kernel.org/linus/6d0bfe22611602f36617bc7aa2ffa1bbb2f54c67

  • fixed by https://git.kernel.org/linus/cf970c002d270c36202bd5b9c2804d3097a52da0

EPSS

Процентиль: 13%
0.00042
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.

redhat
около 12 лет назад

The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.

nvd
около 12 лет назад

The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.

github
больше 3 лет назад

The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application.

EPSS

Процентиль: 13%
0.00042
Низкий