Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 471896 (CVE-2013-2128) - Kernel : oops from tcp_collapse() when using splice(2) (CVE-2013-2128)
Summary: Kernel : oops from tcp_collapse() when using splice(2) (CVE-2013-2128)
Status: RESOLVED FIXED
Alias: CVE-2013-2128
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-05-31 10:14 UTC by Agostino Sarubbo
Modified: 2021-10-25 00:54 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-05-31 10:14:41 UTC
From ${URL} :

Linux kernel which supports splice(2) call to move data across 
file/socket
descriptors via a pipe buffers, is vulnerable to a kernel crash that 
occurs
while calling splice(2) over a tcp socket which in turn calls 
tcp_read_sock().

A user/program could use this flaw to cause system crash, resulting in 
DoS.

Upstream fix:
-------------
  -> 
https://git.kernel.org/linus/baff42ab1494528907bf4d5870359e31711746ae
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-08-30 01:18:21 UTC
CVE-2013-2128 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2128):
  The tcp_read_sock function in net/ipv4/tcp.c in the Linux kernel before
  2.6.34 does not properly manage skb consumption, which allows local users to
  cause a denial of service (system crash) via a crafted splice system call
  for a TCP socket.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-25 00:54:30 UTC
In 2.6.34 onwards