Red Hat Bugzilla – Bug 1039046
CVE-2013-6432 Kernel: ping: NULL pointer dereference on write to msg_name
Last modified: 2016-03-04 06:52:28 EST
Linux kernel built with the TCP/IP networking support(CONFIG_NET) is vulnerable to a NULL pointer dereference flaw. It could occur via a plain read(2) call on a ping socket. Usage of ping sockets is generally restricted to privileged users. A user/program able to read from ping sockets could use this flaw to crash a system resulting in DoS. Upstream fix: ------------- -> https://git.kernel.org/linus/cf970c002d270c36202bd5b9c2804d3097a52da0
Statement: This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.
Acknowledgement: Red Hat would like to thank Mr Hannes Frederic Sowa for reporting this issue.