Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 493558 (CVE-2013-6432) - Kernel : ping: NULL pointer dereference on write to msg_name (CVE-2013-6432)
Summary: Kernel : ping: NULL pointer dereference on write to msg_name (CVE-2013-6432)
Status: RESOLVED FIXED
Alias: CVE-2013-6432
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-12-07 20:01 UTC by Agostino Sarubbo
Modified: 2022-03-25 16:45 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-12-07 20:01:08 UTC
From ${URL} :

Linux kernel built with the TCP/IP networking support(CONFIG_NET) is vulnerable
to a NULL pointer dereference flaw. It could occur via a plain read(2) call on
a ping socket. Usage of ping sockets is generally restricted to privileged
users.

A user/program able to read from ping sockets could use this flaw to crash a
system resulting in DoS.

Upstream fix:
-------------
 -> https://git.kernel.org/linus/cf970c002d270c36202bd5b9c2804d3097a52da0
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-12-12 15:20:20 UTC
CVE-2013-6432 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6432):
  The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before
  3.12.4 does not properly interact with read system calls on ping sockets,
  which allows local users to cause a denial of service (NULL pointer
  dereference and system crash) by leveraging unspecified privileges to
  execute a crafted application.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 16:45:22 UTC
Fix in 3.12.4