Description of the problem: Binding might result in a NULL device which is later dereferenced in rds_ib_laddr_check() function without checking. A local unprivileged user could use this flaw to crash the system. Upstream patch: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c2349758acf1874e4c2b93fe41d072336f1a31d0 References: http://seclists.org/oss-sec/2014/q1/628
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1079222]
Statement: (none)
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0740 https://rhn.redhat.com/errata/RHSA-2014-0740.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:0439 https://rhn.redhat.com/errata/RHSA-2014-0439.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0981 https://rhn.redhat.com/errata/RHSA-2014-0981.html
IssueDescription: A NULL pointer dereference flaw was found in the rds_ib_laddr_check() function in the Linux kernel's implementation of Reliable Datagram Sockets (RDS). A local, unprivileged user could use this flaw to crash the system.
This issue has been addressed in following products: Red Hat Enterprise Linux 6.4 EUS - Server and Compute Node Only Via RHSA-2014:1101 https://rhn.redhat.com/errata/RHSA-2014-1101.html