Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 491366 (CVE-2013-4563) - Kernel : "udp6_ufo_fragment()" Denial of Service Vulnerability (CVE-2013-4563)
Summary: Kernel : "udp6_ufo_fragment()" Denial of Service Vulnerability (CVE-2013-4563)
Status: RESOLVED FIXED
Alias: CVE-2013-4563
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://secunia.com/advisories/55658/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-15 20:09 UTC by Agostino Sarubbo
Modified: 2022-03-25 15:44 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-11-15 20:09:04 UTC
From ${URL} :

Description

Saran Neti has reported a vulnerability in Linux Kernel, which can be exploited by malicious people 
to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the "udp6_ufo_fragment()" function 
(net/ipv6/udp_offload.c) and can be exploited to cause a kernel panic via specially crafted UDP 
packets.

Successful exploitation requires the kernel to be built with the IPv6 protocol (CONFIG_IPV6) 
support and an Ethernet driver (e.g. virtio-net) with the UDP Fragmentation Offload (UFO) feature 
enabled using TBF qdisc.

The vulnerability is reported in versions 3.10.19 and 3.11.8.


Solution:
Fixed in the source code repository.

Further details available to Secunia VIM customers

Provided and/or discovered by:
Saran Neti, TELUS Security Labs via the linux-netdev mailing list.

Original Advisory:
Saran Neti:
http://marc.info/?l=linux-netdev&m=138305762205012&w=2
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-11-27 21:46:00 UTC
CVE-2013-4563 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4563):
  The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel
  through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not
  properly perform a certain size comparison before inserting a fragment
  header, which allows remote attackers to cause a denial of service (panic)
  via a large IPv6 UDP packet, as demonstrated by use of the Token Bucket
  Filter (TBF) queueing discipline.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 15:44:29 UTC
Fix in 3.12.4 onwards