Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4470

Опубликовано: 21 окт. 2013
Источник: redhat
CVSS2: 7.2

Описание

The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.

Отчет

This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2013:180112.12.2013
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:028411.03.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:010028.01.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-456
https://bugzilla.redhat.com/show_bug.cgi?id=1023477Kernel: net: memory corruption with UDP_CORK and UFO

7.2 High

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.

nvd
почти 12 лет назад

The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.

debian
почти 12 лет назад

The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is ...

github
около 3 лет назад

The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.

oracle-oval
больше 11 лет назад

ELSA-2013-2588: unbreakable enterprise kernel security update (IMPORTANT)

7.2 High

CVSS2