From ${URL} : Linux kernel built with IPv6 networking is vulnerable to a crash while sending data as a single datagram over IPv6 socket when UDP_CORK option set. UDP_CORK enables accumulating data and sending it as a single datagram. An unprivileged user/program could use this flaw to crash the kernel, resulting in local DoS. Upstream fix: ============= -> https://git.kernel.org/linus/8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1
CVE-2013-4162 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4162): The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
Fix in 3.10.4 onward