Bugzilla – Bug 854175
VUL-1: CVE-2013-6432: kernel: ping: NULL pointer dereference on write to msg_name
Last modified: 2014-02-25 11:54:15 UTC
Public via oss-security: P J P <ppandit@...> 2013-12-06 13:43:32 GMT Linux kernel built with the TCP/IP networking support(CONFIG_NET) is vulnerable to a NULL pointer dereference flaw. It could occur via a plain read(2) call on a ping socket. Usage of ping sockets is generally restricted to privileged users. A user/program able to read from ping sockets could use this flaw to crash a system resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/cf970c002d270c36202bd5b9c2804d3097a52da0 References: https://bugzilla.redhat.com/show_bug.cgi?id=1039046 http://comments.gmane.org/gmane.comp.security.oss.general/11623
bugbot adjusting priority
CVE-2013-6432
SLE11-SP2/3: N/A. SLE12: has it. oS12.2: will get it through stable - assigning to me to verify. oS12.3: N/A. oS13.1: applied.
openSUSE-SU-2014:0205-1: An update that solves 8 vulnerabilities and has 13 fixes is now available. Category: security (important) Bug References: 733022,773058,838024,844513,845621,846529,848042,849021,850072,852652,852656,852931,853050,853051,853052,853053,854175,854722,856294,859804,860993 CVE References: CVE-2013-4511,CVE-2013-4563,CVE-2013-4587,CVE-2013-6367,CVE-2013-6368,CVE-2013-6376,CVE-2013-6432,CVE-2014-0038 Sources used: openSUSE 13.1 (src): kernel-docs-3.11.10-7.3, kernel-source-3.11.10-7.1, kernel-syms-3.11.10-7.1
Ok, so the bug was actually added by 6d0bfe22611602f36617bc7aa2ffa1bbb2f54c67 which came in in 3.11 AFAICT. oS12.2 does not apply for two reasons: it is 3.4-based and it has reached EOL anyway. Closing.